首页 > 最新文献

International Journal of Next-Generation Computing最新文献

英文 中文
Data Analytical Approach for Evaluating Locus of Control among Private Banks Employees 民营银行员工控制点评价的数据分析方法
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.961
Monika Seth, V. Asudani, Sachin Upadhye, Satyajit Uparkar
Private Banks in India, are owned by individuals or group of limited individual and not by government. Here in India, private banks represent that most of the part of equity or shares are hold by private shares holders and not by government. The locus of control is reflected in terms of the particular degree upto which the private shares holders or the bank employee’s belief that they have power over their private banking events. This research study aims to find out locus of control among bank employees with special reference to private banks based on gender difference as well as two dimensions of locus of control viz. external and internal. Survey method was adopted for this study which covers four private banks within the Nagpur city. Sample size of 200 bank employees consists of bank managers, cashiers, clerks accountant were provided with an online Google form questionnaire. The questionnaire consists of seven questions related to their work, job satisfaction, colleagues clients etc. Initially Cronbach’s alpha test using pilot survey on 50 pre samples of bank employees was used to determine the internal consistency of data model. As second step Explorative statistics gave the trends among the bank employees towards the seven questions. The Descriptive statistics then quantitatively describes the features from a collection of information that can reveal the influence towards the three hypotheses under consideration. Lastly the Inferential statistics based two groups of genders interpret the facts as to accept or reject the three hypotheses under consideration. The study concludes the pro and cons and the prime factors which leads towards the external and internal locus of control among the employees.
印度的私人银行由个人或有限的个人集团所有,而不是由政府拥有。在印度,私人银行代表大部分股权或股份由私人股东持有,而不是由政府持有。控制点反映在私人股东或银行员工相信他们对私人银行事件拥有权力的特定程度上。本研究的目的是基于性别差异找出银行员工的控制点,特别是私人银行,以及控制点的两个维度,即外部和内部。本研究采用调查方法,涵盖那格浦尔市内的四家私人银行。样本量为200名银行员工,包括银行经理、收银员、文员和会计,他们填写了一份在线谷歌表格问卷。问卷由七个问题组成,涉及他们的工作、工作满意度、同事和客户等。首先采用Cronbach 's alpha检验,对50个银行员工预样本进行试点调查,以确定数据模型的内部一致性。作为第二步,探索性统计给出了银行员工对这七个问题的倾向。然后,描述性统计定量地描述信息集合中的特征,这些特征可以揭示对所考虑的三个假设的影响。最后,基于两组性别的推理统计解释事实,以接受或拒绝所考虑的三个假设。本研究总结了员工外部控制点和内部控制点的利弊,以及导致员工外部控制点和内部控制点的主要因素。
{"title":"Data Analytical Approach for Evaluating Locus of Control among Private Banks Employees","authors":"Monika Seth, V. Asudani, Sachin Upadhye, Satyajit Uparkar","doi":"10.47164/ijngc.v13i5.961","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.961","url":null,"abstract":"Private Banks in India, are owned by individuals or group of limited individual and not by government. Here in India, private banks represent that most of the part of equity or shares are hold by private shares holders and not by government. The locus of control is reflected in terms of the particular degree upto which the private shares holders or the bank employee’s belief that they have power over their private banking events. This research study aims to find out locus of control among bank employees with special reference to private banks based on gender difference as well as two dimensions of locus of control viz. external and internal. Survey method was adopted for this study which covers four private banks within the Nagpur city. Sample size of 200 bank employees consists of bank managers, cashiers, clerks accountant were provided with an online Google form questionnaire. The questionnaire consists of seven questions related to their work, job satisfaction, colleagues clients etc. Initially Cronbach’s alpha test using pilot survey on 50 pre samples of bank employees was used to determine the internal consistency of data model. As second step Explorative statistics gave the trends among the bank employees towards the seven questions. The Descriptive statistics then quantitatively describes the features from a collection of information that can reveal the influence towards the three hypotheses under consideration. Lastly the Inferential statistics based two groups of genders interpret the facts as to accept or reject the three hypotheses under consideration. The study concludes the pro and cons and the prime factors which leads towards the external and internal locus of control among the employees.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"57 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82870362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Marchenko–Pastur SVD and Linear MMSE Estimation for Reducing Image Noise 利用Marchenko-Pastur奇异值分解和线性MMSE估计降低图像噪声
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.915
Swati Rane, Lakshmappa K. Ragha, Siddalingappagouda Biradar, Vaibhav R. Pandit
The degradation in visual quality of images is often seen due to a variety of noise added inevitably at the time of image acquisition. Its restoration has thus become a fundamental and significant problem in image processing. Many attempts are made in recent past to efficiently denoise images. But, the best possible solution to this problem is still an open research problem. This paper validates the effectiveness of one such popular image denoising approach, where an adaptive image patch clustering is followed by the two step denoising algorithm in Principal Component Analysis (PCA) domain. First step uses Marchenko–Pastur law based hard thresholding of singular values in the singular value decomposition (SVD) domain and the second step removes remaining noise in PCA domain using Linear Minimum Mean-Squared-Error (LMMSE), a soft thresholding. The experimentation is conducted on gray-scale images corrupted by four different noise types namely speckle, salt & pepper, Gaussian, and Poisson. The efficiency of image denoising is quantified in terms of popular image quality metrics peak signal-to-noise ratio (PSNR), structural similarity (SSIM), feature similarity (FSIM), and the denoising time. The comprehensive performance analysis of the denoising approach against the four noise models underlies its suitability to various applications. This certainly gives the new researchers a direction for selection of image denoising method.
由于在图像采集过程中不可避免地加入了各种噪声,导致图像的视觉质量下降。因此,它的恢复已成为图像处理中的一个基本而重要的问题。近年来,为了有效地对图像进行去噪,人们进行了许多尝试。但是,这个问题的最佳解决方案仍然是一个开放的研究问题。本文验证了一种流行的图像去噪方法的有效性,其中自适应图像补丁聚类之后是主成分分析(PCA)域的两步去噪算法。第一步在奇异值分解(SVD)域中使用基于Marchenko-Pastur定律的奇异值硬阈值,第二步在PCA域中使用线性最小均方误差(LMMSE)软阈值去除剩余噪声。在被散斑噪声、椒盐噪声、高斯噪声和泊松噪声四种不同噪声类型破坏的灰度图像上进行了实验。图像去噪效率通过常用的图像质量指标——峰值信噪比(PSNR)、结构相似度(SSIM)、特征相似度(FSIM)和去噪时间来量化。对四种噪声模型的综合性能分析表明,该方法适合于各种应用。这为新研究者在图像去噪方法的选择上提供了一个方向。
{"title":"Using Marchenko–Pastur SVD and Linear MMSE Estimation for Reducing Image Noise","authors":"Swati Rane, Lakshmappa K. Ragha, Siddalingappagouda Biradar, Vaibhav R. Pandit","doi":"10.47164/ijngc.v13i5.915","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.915","url":null,"abstract":"The degradation in visual quality of images is often seen due to a variety of noise added inevitably at the time of image acquisition. Its restoration has thus become a fundamental and significant problem in image processing. Many attempts are made in recent past to efficiently denoise images. But, the best possible solution to this problem is still an open research problem. This paper validates the effectiveness of one such popular image denoising approach, where an adaptive image patch clustering is followed by the two step denoising algorithm in Principal Component Analysis (PCA) domain. First step uses Marchenko–Pastur law based hard thresholding of singular values in the singular value decomposition (SVD) domain and the second step removes remaining noise in PCA domain using Linear Minimum Mean-Squared-Error (LMMSE), a soft thresholding. The experimentation is conducted on gray-scale images corrupted by four different noise types namely speckle, salt & pepper, Gaussian, and Poisson. The efficiency of image denoising is quantified in terms of popular image quality metrics peak signal-to-noise ratio (PSNR), structural similarity (SSIM), feature similarity (FSIM), and the denoising time. The comprehensive performance analysis of the denoising approach against the four noise models underlies its suitability to various applications. This certainly gives the new researchers a direction for selection of image denoising method.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"69 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88147019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disaster Information Verification and Validation Application Using Machine Learning 使用机器学习的灾难信息验证和验证应用
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.907
Sameer Shekhar Mishra, Atharva Bisen, Soham Mundhada, Utkarsh Singh, Vrushali Bongirwar
Social media platforms have made it possible for people and organizations to disseminate information to their peers and target markets. Even while most information is shared with the best of intentions, some people utilize social media to further their own agendas. They might publish untrue or inaccurate information in their posts. Before, during, and after disasters and emergencies, social media is rife with rumors, misinformation, and misleading information. These false rumors and information could also make individuals anxious. How to stop the spread of this incorrect information is one of the main problems that public safety authorities and organizations face. DIVVA is a system that, using some provided input text data, evaluates and validates disaster-related information. The system has two tracks: a validation track and a verification track. Verification will classify the textual inputinto categories related to disasters or not related to disasters. The Validation track, on the other hand, will use the official handles of government disaster relief organizations like the NDRF (National Disaster Response Force) to determine whether the event mentioned in the text data actually happened or not before classifying the disaster- related data as real or fake. Therefore, if many individuals receive erroneous information about a calamity, we can utilize our approach to determine if the information is true or false. Our results show that the Bidirectional LSTM model performs well for the tweet classification (i.e. whether the tweets are related to disaster or not) task with 84% accuracy.
社交媒体平台使个人和组织向他们的同伴和目标市场传播信息成为可能。尽管大多数信息是出于好意分享的,但有些人利用社交媒体来推进自己的议程。他们可能会在他们的帖子中发布不真实或不准确的信息。在灾难和紧急情况发生之前、期间和之后,社交媒体充斥着谣言、错误信息和误导性信息。这些虚假的谣言和信息也会使个人焦虑。如何阻止这种不正确信息的传播是公安部门和组织面临的主要问题之一。DIVVA是一个系统,它使用一些提供的输入文本数据,评估和验证与灾害有关的信息。系统有两条轨道:验证轨道和验证轨道。验证将文本输入分为与灾害相关或与灾害无关的类别。另一方面,验证轨道将使用NDRF(国家灾害响应部队)等政府救灾组织的官方处理,在将灾害相关数据分类为真实或虚假之前,确定文本数据中提到的事件是否确实发生过。因此,如果许多人收到关于灾难的错误信息,我们可以利用我们的方法来确定信息是真还是假。我们的研究结果表明,双向LSTM模型在推文分类(即推文是否与灾难有关)任务中表现良好,准确率为84%。
{"title":"Disaster Information Verification and Validation Application Using Machine Learning","authors":"Sameer Shekhar Mishra, Atharva Bisen, Soham Mundhada, Utkarsh Singh, Vrushali Bongirwar","doi":"10.47164/ijngc.v13i5.907","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.907","url":null,"abstract":"Social media platforms have made it possible for people and organizations to disseminate information to their peers and target markets. Even while most information is shared with the best of intentions, some people utilize social media to further their own agendas. They might publish untrue or inaccurate information in their posts. Before, during, and after disasters and emergencies, social media is rife with rumors, misinformation, and misleading information. These false rumors and information could also make individuals anxious. How to stop the spread of this incorrect information is one of the main problems that public safety authorities and organizations face. DIVVA is a system that, using some provided input text data, evaluates and validates disaster-related information. The system has two tracks: a validation track and a verification track. Verification will classify the textual inputinto categories related to disasters or not related to disasters. The Validation track, on the other hand, will use the official handles of government disaster relief organizations like the NDRF (National Disaster Response Force) to determine whether the event mentioned in the text data actually happened or not before classifying the disaster- related data as real or fake. Therefore, if many individuals receive erroneous information about a calamity, we can utilize our approach to determine if the information is true or false. Our results show that the Bidirectional LSTM model performs well for the tweet classification (i.e. whether the tweets are related to disaster or not) task with 84% accuracy.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"34 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75566867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Source Camera by Amalgamation of PRNU and Noise Print Using Dimensionality Expansive Residual Network 基于维数扩展残差网络的PRNU和噪声融合源相机识别
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.919
Shubham Anjankar, Somesh Telang, Khushalsingh Bharadwaj, R. Khandelwal
It might be challenging in the field of image forensics to identify the source camera of a picture. This researchproposes a noise adaptable convolutional neural network-based technique for camera identification. For cameraidentification, the suggested solution combines Photo Response Non-Uniformity (PRNU) noise and Noiseprint.Three parallel dimensionality expanded residual networks with convolutional layers of kernel size 1x1 were puttogether for enhanced feature extraction. The experiment mentioned above uses pictures from the ”Vision Dataset”as its subject matter. The experimental findings demonstrate the effectiveness of the suggested methodology inidentifying the source camera at the brand, model, and device levels. When two of the three networks were fedwith PRNU and one with noiseprint, the best performance was obtained.
在图像取证领域,识别照片的源相机可能是一个挑战。本文提出了一种基于卷积神经网络的噪声自适应相机识别技术。对于相机识别,建议的解决方案结合了光响应非均匀性(PRNU)噪声和噪声打印。将核大小为1x1的卷积层的三个平行维扩展残差网络组合在一起,增强特征提取。上面提到的实验使用来自“视觉数据集”的图片作为其主题。实验结果证明了所建议的方法在品牌、型号和设备级别识别源相机方面的有效性。其中2个网络分别加入PRNU和1个网络分别加入噪声印迹,效果最佳。
{"title":"Identification of Source Camera by Amalgamation of PRNU and Noise Print Using Dimensionality Expansive Residual Network","authors":"Shubham Anjankar, Somesh Telang, Khushalsingh Bharadwaj, R. Khandelwal","doi":"10.47164/ijngc.v13i5.919","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.919","url":null,"abstract":"It might be challenging in the field of image forensics to identify the source camera of a picture. This researchproposes a noise adaptable convolutional neural network-based technique for camera identification. For cameraidentification, the suggested solution combines Photo Response Non-Uniformity (PRNU) noise and Noiseprint.Three parallel dimensionality expanded residual networks with convolutional layers of kernel size 1x1 were puttogether for enhanced feature extraction. The experiment mentioned above uses pictures from the ”Vision Dataset”as its subject matter. The experimental findings demonstrate the effectiveness of the suggested methodology inidentifying the source camera at the brand, model, and device levels. When two of the three networks were fedwith PRNU and one with noiseprint, the best performance was obtained.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"91 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79412523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments 面向雾部署的隐私保护安全模型的实用评估
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.935
Roshan Gunwantrao Belsare, Premchand B. Ambhore
Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.
雾层位于云层和边缘层之间,负责选择边缘节点来处理云任务。雾设备管理路由器、网关和其他调度组件,这使得它们极易受到安全攻击。攻击者在服务器层、中间件层或感知层注入恶意数据包,导致各种类型的攻击。这些攻击包括节点捕获、信号干扰、节点中断、授权、选择性转发、数据泄露等。为了消除这些攻击,研究人员提出了各种解决方案,包括授权、加密、纠错、防火墙、广播认证、选择性披露等。此外,这些解决方案在隐私和安全质量度量、攻击防御能力和部署服务质量(QoS)方面有所不同。因此,测试和部署这些解决方案非常耗时,需要额外的人力进行性能验证。因此,雾部署比相应的云部署需要更长的上市时间和成本。为了减少测试和验证这些弹性技术的时间,本文回顾了各种雾安全和隐私保护模型,并讨论了它们的细微差别、优势、局限性和未来的研究范围。此外,它还在审查的模型之间执行详细的性能比较,这有助于为给定的应用程序场景选择最佳的可能方法。本文还推荐了各种基于融合的方法,这些方法可以应用于现有的安全和隐私模型,以进一步提高其性能。这些方法包括杂交、选择性增强和基于q学习的模型,这些模型有助于提高加密效率、隐私保护,同时保持高QoS水平。
{"title":"Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments","authors":"Roshan Gunwantrao Belsare, Premchand B. Ambhore","doi":"10.47164/ijngc.v13i5.935","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.935","url":null,"abstract":"Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"498 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80029549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an Ensemble Segmentation, Feature Processing & Classification model for identification of Cotton Fungal diseases 棉花真菌病害识别的集成分割、特征处理与分类模型设计
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.959
Sandhya N. Dhage, Vijay Kumar Garg
Cotton fungal diseases include rust, alternaria leaf spot, fusarium wilt, grew mildew, and root rots. Identification of these diseases requires design of efficient fungi segmentation, feature representation & classification models. Existing methods that perform these tasks, are highly complex, and require disease-specific segmentation techniques, which limits their scalability levels. Moreover, low-complexity models are generally observed to showcase low accuracy levels, which restricts their applicability for real-time use cases. To overcome these issues, proposed design focused on a novel ensemble segmentation, feature processing & classification model for identification of cotton fungi diseases. The proposed model initially uses a combination of Fuzzy C Means (FCM), Enhanced FCM, KFCM, and saliency maps in order to extract Regions of Interest (RoIs). These RoIs are post-processed via a light-weight colour-feature based disease category identification layer, which assists in selecting the segmented image sets. These image sets are processed via an ensemble feature representation layer, which combines Colour Maps, Edge Maps, Gabor Maps and Convolutional feature sets. Due to evaluation of multiple feature sets, the model is able to improve classification performance for multiple disease types. Extracted features are classified via use of an ensemble classification model that combines Naïve Bayes (NB), Support Vector Machines (SVMs), Logistic Regression (LR), and Multilayer Perceptron (MLP) based classifiers. Due to this combination of segmentation, feature representation & classification models, the proposed Model is capable of improving classification accuracy by 5.9%, precision by 4.5%, recall by 3.8%, and delay by 8.5% when compared with state-of-the-art models, which makes it useful for real-time disease detection of crops.
棉花真菌病包括锈病、叶斑病、枯萎病、霉变病和根腐病。识别这些疾病需要设计有效的真菌分割、特征表示和分类模型。执行这些任务的现有方法非常复杂,并且需要特定疾病的分割技术,这限制了它们的可扩展性水平。此外,低复杂性模型通常显示出较低的精度水平,这限制了它们对实时用例的适用性。为了克服这些问题,提出了一种新的棉花真菌病害识别集成分割、特征处理和分类模型。提出的模型最初使用模糊C均值(FCM)、增强FCM、KFCM和显著性图的组合来提取感兴趣区域(roi)。这些roi通过一个轻量级的基于颜色特征的疾病类别识别层进行后处理,该层有助于选择分割的图像集。这些图像集通过集成特征表示层进行处理,该层结合了颜色地图、边缘地图、Gabor地图和卷积特征集。由于对多个特征集进行评估,该模型能够提高对多种疾病类型的分类性能。提取的特征通过使用集成分类模型进行分类,该模型结合了Naïve贝叶斯(NB)、支持向量机(svm)、逻辑回归(LR)和基于多层感知器(MLP)的分类器。由于该模型结合了分割、特征表示和分类模型,与现有模型相比,该模型的分类准确率提高了5.9%,精度提高了4.5%,召回率提高了3.8%,延迟提高了8.5%,可用于农作物病害的实时检测。
{"title":"Design of an Ensemble Segmentation, Feature Processing & Classification model for identification of Cotton Fungal diseases","authors":"Sandhya N. Dhage, Vijay Kumar Garg","doi":"10.47164/ijngc.v13i5.959","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.959","url":null,"abstract":"Cotton fungal diseases include rust, alternaria leaf spot, fusarium wilt, grew mildew, and root rots. Identification of these diseases requires design of efficient fungi segmentation, feature representation & classification models. Existing methods that perform these tasks, are highly complex, and require disease-specific segmentation techniques, which limits their scalability levels. Moreover, low-complexity models are generally observed to showcase low accuracy levels, which restricts their applicability for real-time use cases. To overcome these issues, proposed design focused on a novel ensemble segmentation, feature processing & classification model for identification of cotton fungi diseases. The proposed model initially uses a combination of Fuzzy C Means (FCM), Enhanced FCM, KFCM, and saliency maps in order to extract Regions of Interest (RoIs). These RoIs are post-processed via a light-weight colour-feature based disease category identification layer, which assists in selecting the segmented image sets. These image sets are processed via an ensemble feature representation layer, which combines Colour Maps, Edge Maps, Gabor Maps and Convolutional feature sets. Due to evaluation of multiple feature sets, the model is able to improve classification performance for multiple disease types. Extracted features are classified via use of an ensemble classification model that combines Naïve Bayes (NB), Support Vector Machines (SVMs), Logistic Regression (LR), and Multilayer Perceptron (MLP) based classifiers. Due to this combination of segmentation, feature representation & classification models, the proposed Model is capable of improving classification accuracy by 5.9%, precision by 4.5%, recall by 3.8%, and delay by 8.5% when compared with state-of-the-art models, which makes it useful for real-time disease detection of crops.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"7 2 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82824081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Technology: Growing Usecases and Issues to Tackle 区块链技术:日益增长的用例和需要解决的问题
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.917
Firdous Sadaf M. Ismail, Dattatraya S Adane
Advantages of decentralized systems over centralized approaches are reason for increasing incorporation of blockchain technology in almost every digital task. Core benefits of blockchain include decentralization, persistency, auditability and anonymity. This paper discusses Blockchain Technology from the perspective of related attributes, applications and challenges. Specifically, we try to elaborate on the current work pertaining to application of Blockchain Technology to different domains such as Internet of Things (IoT), Artificial Intelligence (AI), Big Data and Software Defined Networking (SDN) keeping in view the challenges of optimized storage, scalability and security.
去中心化系统相对于中心化方法的优势是区块链技术越来越多地应用于几乎所有数字任务的原因。区块链的核心优势包括去中心化、持久性、可审计性和匿名性。本文从区块链技术的相关属性、应用和挑战等方面进行了论述。具体来说,我们试图详细阐述当前有关区块链技术在物联网(IoT)、人工智能(AI)、大数据和软件定义网络(SDN)等不同领域应用的工作,同时考虑到优化存储、可扩展性和安全性的挑战。
{"title":"Blockchain Technology: Growing Usecases and Issues to Tackle","authors":"Firdous Sadaf M. Ismail, Dattatraya S Adane","doi":"10.47164/ijngc.v13i5.917","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.917","url":null,"abstract":"Advantages of decentralized systems over centralized approaches are reason for increasing incorporation of blockchain technology in almost every digital task. Core benefits of blockchain include decentralization, persistency, auditability and anonymity. This paper discusses Blockchain Technology from the perspective of related attributes, applications and challenges. Specifically, we try to elaborate on the current work pertaining to application of Blockchain Technology to different domains such as Internet of Things (IoT), Artificial Intelligence (AI), Big Data and Software Defined Networking (SDN) keeping in view the challenges of optimized storage, scalability and security.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"27 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85167604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Adaptive Filtering Technique for Removal of Impulse Noise Using Gabor Filter 基于Gabor滤波的脉冲噪声自动自适应滤波技术
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.904
Swati Rane, Lakshmappa K. Ragha, Siddalingappagouda Biradar
Tremendous development in Internet of Things (IoT) and mobile devices lead to several images pooled on social media websites and communicated through networking channels. These images are mostly corrupted with impulse noises due to hot pixels generated in the camera sensors and communication channels. Adaptive mean filter technique removes impulse noise at low density but is unsuccessful as noise density increases and computationally expensive. In this paper, automatic adaptive filtering technique for removal of impulse (salt and pepper) noise is demonstrated. The proposed algorithm consists of impulse noise detection and noise removal modules. An automatic impulse noise detection module is based on mean and variance technique that selects the noisy pixels among the entire image. The noise removal module is based on replacement of noisy pixel through mean and edge direction using Gabor filter. The proposed technique demonstrated better robustness compared with existing techniques.
物联网(IoT)和移动设备的巨大发展导致社交媒体网站上汇集了几张图片,并通过网络渠道进行传播。由于相机传感器和通信通道产生的热像素,这些图像大多被脉冲噪声破坏。自适应均值滤波技术可以去除低密度下的脉冲噪声,但随着噪声密度的增加和计算成本的增加,该技术无法实现。本文介绍了一种用于去除脉冲(盐和胡椒)噪声的自动自适应滤波技术。该算法由脉冲噪声检测和去噪两个模块组成。基于均值方差技术的脉冲噪声自动检测模块,从整个图像中选择噪声像素。噪声去除模块是基于使用Gabor滤波器通过均值和边缘方向替换噪声像素。与现有方法相比,该方法具有更好的鲁棒性。
{"title":"Automatic Adaptive Filtering Technique for Removal of Impulse Noise Using Gabor Filter","authors":"Swati Rane, Lakshmappa K. Ragha, Siddalingappagouda Biradar","doi":"10.47164/ijngc.v13i5.904","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.904","url":null,"abstract":"Tremendous development in Internet of Things (IoT) and mobile devices lead to several images pooled on social media websites and communicated through networking channels. These images are mostly corrupted with impulse noises due to hot pixels generated in the camera sensors and communication channels. Adaptive mean filter technique removes impulse noise at low density but is unsuccessful as noise density increases and computationally expensive. In this paper, automatic adaptive filtering technique for removal of impulse (salt and pepper) noise is demonstrated. The proposed algorithm consists of impulse noise detection and noise removal modules. An automatic impulse noise detection module is based on mean and variance technique that selects the noisy pixels among the entire image. The noise removal module is based on replacement of noisy pixel through mean and edge direction using Gabor filter. The proposed technique demonstrated better robustness compared with existing techniques.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"119 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86183641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covid Security System Using IOT Monitoring System Covid安防系统采用物联网监控系统
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.908
Chandrakant Mohadikar, Rakshit Najbile, Vivek Kaushik, Yash Konghe, Deepak Khushalani, Pankaj Joshi
Covid Security System is a non-contact sanitizer dispenser, that also monitorsvital parameters such as temperature, heart rate, and spo2 sensors based onInternet of Things (IOT) data collection and processing. This device is vital inworkplaces like hospitals, colleges, and many more. The system that has thecapability to record human body temperature based on contactless mechanismefficiently with pandemic situation has looked up to usage of infraredthermometers. In this paper via our research we realize the human bodytemperature fast non-contact by utilizing infrared thermometer (MLX90614) alongwith a pulse oximeter using a pulse sensor (MAX30100) to measure the heartrate in real-time. Parameter like the oxygen level of the user is also rendered andstored on our designed IOT processing framework which can provide alerts bothonline or offline based on previous maintained records. In this research we haverecorded parameters of the sample space comprising of 500 users. The mainaspect of the research is the cost affectability where is the system can be easilyinterfaced with any existing framework of workplaces.
Covid安全系统是一款非接触式洗手液分配器,还可以监测基于物联网(IOT)数据收集和处理的重要参数,如温度、心率和spo2传感器。这种设备在医院、大学等工作场所至关重要。基于非接触式机制有效记录人体体温的系统在大流行情况下已经开始使用红外体温计。本文通过研究,利用红外测温仪(MLX90614)和脉搏血氧仪(MAX30100),实现了人体体温的快速非接触式实时测量。用户的氧气水平等参数也被呈现并存储在我们设计的物联网处理框架中,该框架可以根据以前维护的记录提供在线或离线警报。在这项研究中,我们记录了由500个用户组成的样本空间的参数。研究的主要方面是成本的影响,即系统可以很容易地与任何现有的工作场所框架接口。
{"title":"Covid Security System Using IOT Monitoring System","authors":"Chandrakant Mohadikar, Rakshit Najbile, Vivek Kaushik, Yash Konghe, Deepak Khushalani, Pankaj Joshi","doi":"10.47164/ijngc.v13i5.908","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.908","url":null,"abstract":"Covid Security System is a non-contact sanitizer dispenser, that also monitorsvital parameters such as temperature, heart rate, and spo2 sensors based onInternet of Things (IOT) data collection and processing. This device is vital inworkplaces like hospitals, colleges, and many more. The system that has thecapability to record human body temperature based on contactless mechanismefficiently with pandemic situation has looked up to usage of infraredthermometers. In this paper via our research we realize the human bodytemperature fast non-contact by utilizing infrared thermometer (MLX90614) alongwith a pulse oximeter using a pulse sensor (MAX30100) to measure the heartrate in real-time. Parameter like the oxygen level of the user is also rendered andstored on our designed IOT processing framework which can provide alerts bothonline or offline based on previous maintained records. In this research we haverecorded parameters of the sample space comprising of 500 users. The mainaspect of the research is the cost affectability where is the system can be easilyinterfaced with any existing framework of workplaces.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"79 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83350851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ManiacNFT : An Application for NFT Marketplace ManiacNFT: NFT市场应用程序
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.916
Gaurav Laud, Aishwarya Pardhi, Ajinkya Wadekar, Shounik Shukla, Varad Loya, Dr. Padma Adane, Viresh Dhawan
Art is mankind's treasure, yet it is often concentrated in the hands of a few. We need a better trade mechanism and technological innovation to enable fair access to artworks. A solution to the problem can be found by using the NFT technology for the trade of artwork. NFTs make the future for the creators’ economy a little brighter, allowing artists to monetize their work by selling to eager collectors, while also collecting due royalties upon future resales of their works. This unique combination of blockchain with artworks provides a layer of security to the ownership of the artwork, and is restoring access to artworks for people from all regions.This research paper is about a decentralized marketplace application where one can buy and sell artworks in the form of NFTs digitally, providing the users with the facility to securely perform transactions of these NFTs that can be verified through Polygon blockchain.
艺术是人类的财富,但它往往集中在少数人手中。我们需要一个更好的贸易机制和技术创新,以实现艺术品的公平获取。通过将NFT技术应用于艺术品交易,可以找到解决这个问题的方法。nft让创作者的经济前景变得更加光明,它允许艺术家将自己的作品卖给热切的收藏家,同时还可以在未来转售作品时收取应有的版税。区块链与艺术品的这种独特结合为艺术品的所有权提供了一层安全保障,并为来自所有地区的人们恢复了对艺术品的访问。本研究论文是关于一个去中心化的市场应用程序,在这个应用程序中,人们可以以数字nft的形式买卖艺术品,为用户提供安全执行这些nft交易的设施,这些nft可以通过Polygon区块链进行验证。
{"title":"ManiacNFT : An Application for NFT Marketplace","authors":"Gaurav Laud, Aishwarya Pardhi, Ajinkya Wadekar, Shounik Shukla, Varad Loya, Dr. Padma Adane, Viresh Dhawan","doi":"10.47164/ijngc.v13i5.916","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.916","url":null,"abstract":"Art is mankind's treasure, yet it is often concentrated in the hands of a few. We need a better trade mechanism and technological innovation to enable fair access to artworks. A solution to the problem can be found by using the NFT technology for the trade of artwork. NFTs make the future for the creators’ economy a little brighter, allowing artists to monetize their work by selling to eager collectors, while also collecting due royalties upon future resales of their works. This unique combination of blockchain with artworks provides a layer of security to the ownership of the artwork, and is restoring access to artworks for people from all regions.This research paper is about a decentralized marketplace application where one can buy and sell artworks in the form of NFTs digitally, providing the users with the facility to securely perform transactions of these NFTs that can be verified through Polygon blockchain.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"38 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80810198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Next-Generation Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1