首页 > 最新文献

International Journal of Next-Generation Computing最新文献

英文 中文
Gender Recognition by Voice using Machine Learning Techniques 使用机器学习技术的语音性别识别
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1031
Sweta Jain, Neha Pandey, Vaidehi Choudhari, Pratik Yawalkar, Amey Admane
Gender Recognition using voice is of enormous prominence in the near future technology as its uses could range from smart assistance robots to customer service sector and many more. Machine learning (ML) models play a vital role in achieving this task. Using the acoustic properties of voice, different ML models classify the gender as male and female. In this research we have used the ML models- Random Forest, Decision Tree, Logistic Regression, Support Vector Machine (SVM), Gradient Boosting, K-Nearest Neighbor (KNN), and ensemble method (KNN, logistic regression, SVM). To propose which algorithm is best for recognizing gender, we have evaluated the models based on results achieved from analysis of accuracy, recall, F1 score, and precision.
在不久的将来,使用语音进行性别识别将是一项非常重要的技术,因为它的用途可以从智能辅助机器人到客户服务部门等等。机器学习(ML)模型在实现这一任务中起着至关重要的作用。利用声音的声学特性,不同的ML模型将性别划分为男性和女性。在这项研究中,我们使用了ML模型-随机森林,决策树,逻辑回归,支持向量机(SVM),梯度增强,k -最近邻(KNN)和集成方法(KNN,逻辑回归,SVM)。为了提出最适合识别性别的算法,我们根据准确度、召回率、F1分数和精度分析得出的结果对模型进行了评估。
{"title":"Gender Recognition by Voice using Machine Learning Techniques","authors":"Sweta Jain, Neha Pandey, Vaidehi Choudhari, Pratik Yawalkar, Amey Admane","doi":"10.47164/ijngc.v14i1.1031","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1031","url":null,"abstract":"Gender Recognition using voice is of enormous prominence in the near future technology as its uses could range from smart assistance robots to customer service sector and many more. Machine learning (ML) models play a vital role in achieving this task. Using the acoustic properties of voice, different ML models classify the gender as male and female. In this research we have used the ML models- Random Forest, Decision Tree, Logistic Regression, Support Vector Machine (SVM), Gradient Boosting, K-Nearest Neighbor (KNN), and ensemble method (KNN, logistic regression, SVM). To propose which algorithm is best for recognizing gender, we have evaluated the models based on results achieved from analysis of accuracy, recall, F1 score, and precision.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"74 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89004757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Life Saver System for People Living in Earthquake Zone 地震灾区智能救生系统
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1040
Yogesh Thakare, Utkarsha Wankhade, H. Kasturiwale
Natural calamities are the major challenged in front of any counties. Calamities are produced either natural or manmade, such as earthquakes, wild-fires, floods and terrorist attacks etc. Earthquakes mean destruction which not only hampers human but also animals. After the occurrence of earthquakes infrastructure damaged becomes the major issues. Buildings, bridges and houses collapse due to earthquake. Under this debris many people or animals bury. A timely detection and rescue can only save the people who are buried and wounded. Several methods are exits to detect and rescue the human buried under the rubble which are comes in action after the occurring of natural calamities. The propose system is quite different as compared with the existing system. It is already mounted in a buildings or houses nearby in earthquake zones. The advantage of this system is to minimize time require in detecting and rescuing the victim affected buried under the rubble.
自然灾害是各国面临的主要挑战。灾难要么是自然的,要么是人为的,比如地震、野火、洪水和恐怖袭击等。地震意味着破坏,这不仅妨碍了人类,也妨碍了动物。地震发生后,基础设施的破坏成为主要问题。建筑物、桥梁和房屋因地震而倒塌。许多人或动物被埋在这些碎片下面。及时的发现和救援只能挽救被埋和受伤的人。自然灾害发生后,被埋人员的探测和救援方法有几种。与现行制度相比,拟议的制度有很大的不同。它已经安装在震区附近的建筑物或房屋中。该系统的优点是最大限度地减少了发现和救援被埋在废墟下的受害者所需的时间。
{"title":"Intelligent Life Saver System for People Living in Earthquake Zone","authors":"Yogesh Thakare, Utkarsha Wankhade, H. Kasturiwale","doi":"10.47164/ijngc.v14i1.1040","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1040","url":null,"abstract":"Natural calamities are the major challenged in front of any counties. Calamities are produced either natural or manmade, such as earthquakes, wild-fires, floods and terrorist attacks etc. Earthquakes mean destruction which not only hampers human but also animals. After the occurrence of earthquakes infrastructure damaged becomes the major issues. Buildings, bridges and houses collapse due to earthquake. Under this debris many people or animals bury. A timely detection and rescue can only save the people who are buried and wounded. Several methods are exits to detect and rescue the human buried under the rubble which are comes in action after the occurring of natural calamities. The propose system is quite different as compared with the existing system. It is already mounted in a buildings or houses nearby in earthquake zones. The advantage of this system is to minimize time require in detecting and rescuing the victim affected buried under the rubble.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"121 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80222857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
OPTIMAL WIFI POSITION DETECTION USING ARTIFICIAL INTELLIGENCE 利用人工智能优化wifi位置检测
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1027
Heena Agrawal, Rahul Agrawal, Rohit Chandani, Sakshi Nema
The placement of WI-FI routers in the network is an intensive problem concerning connectivity and coverage.It directly affects the transmission loss, installation cost, operational complexity, wi-fi network coverage, etc.However, optimizing the location of the routers can resolve these issues and increase network performance. Thus,using major deep-learning models the problem is resolved. The proposed model concentrates on the optimization of the objective function in terms of the empty spaces, hindrances such as concrete walls, metallic objects, etc. in the area, maximum client coverage in the location, and the network connectivity. It is an initial step to ensure the desired network performance such as throughput, connectivity, and coverage of the network.. Furthermore, a Wi-Fi analyzing system for generating the results based on the observations of the Wi-Fi router network is implemented. It analyzes the wireless network, devices in the network, and the connected users. The model also gives a WLAN report of the Wi-Fi router
WI-FI路由器在网络中的位置是一个涉及连接和覆盖的密集问题。它直接影响到传输损耗、安装成本、操作复杂性、wi-fi网络覆盖等。而优化路由器的位置可以解决这些问题,提高网络性能。因此,使用主要的深度学习模型可以解决这个问题。所提出的模型侧重于目标函数的优化,包括区域内的空空间、混凝土墙、金属物体等障碍物、位置内最大客户覆盖率和网络连通性。这是确保所需的网络性能(如吞吐量、连接性和网络覆盖)的第一步。此外,还实现了基于对Wi-Fi路由器网络的观察产生结果的Wi-Fi分析系统。它分析了无线网络、网络中的设备和连接的用户。该模型还给出了Wi-Fi路由器的WLAN报告
{"title":"OPTIMAL WIFI POSITION DETECTION USING ARTIFICIAL INTELLIGENCE","authors":"Heena Agrawal, Rahul Agrawal, Rohit Chandani, Sakshi Nema","doi":"10.47164/ijngc.v14i1.1027","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1027","url":null,"abstract":"The placement of WI-FI routers in the network is an intensive problem concerning connectivity and coverage.It directly affects the transmission loss, installation cost, operational complexity, wi-fi network coverage, etc.However, optimizing the location of the routers can resolve these issues and increase network performance. Thus,using major deep-learning models the problem is resolved. The proposed model concentrates on the optimization of the objective function in terms of the empty spaces, hindrances such as concrete walls, metallic objects, etc. in the area, maximum client coverage in the location, and the network connectivity. It is an initial step to ensure the desired network performance such as throughput, connectivity, and coverage of the network.. Furthermore, a Wi-Fi analyzing system for generating the results based on the observations of the Wi-Fi router network is implemented. It analyzes the wireless network, devices in the network, and the connected users. The model also gives a WLAN report of the Wi-Fi router","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"44 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78567402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-label Classification Performance using Deep Learning 基于深度学习的多标签分类性能
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1094
Snehal Awachat
Understanding and using extensive, elevated, and heterogeneous biological data continues to be a major obstacle in the transformation of medical services.  Digital health records, neuroimaging, sensor readings, and literature, which are all complicated, heterogeneous, inadequately labelled, and frequently unorganized, are all growing in contemporary biology and medicine. Prior to building prediction or sorting designs in front of the attributes, conventional information retrieval and statistical modelling predicates need to do data augmentation to extract useful and more durable features from the information. In the case of complex material and inadequate technical understanding, a variety of problems along both phases. The most recent convolutional technological advancements offer new, efficient frameworks to create end-to-end teaching methods from massive information. Therefore, in paper, we examine the most recent research on using deep techniques to improve the medical field. We propose that deeper learning technologies may be the means of converting large-scale physiological data into enhancing human ability based on the reviewed studies. We additionally draw attention to some drawbacks and the requirement for better technique design and application, particularly in terms of simplicity of comprehension for subject matter experts and social researchers. In order to bridge deeper learning models with natural interpretability, we examine these problems and recommend creating comprehensive and meaningful decipherable architectures.
理解和使用广泛的、高水平的和异构的生物数据仍然是医疗服务转型的主要障碍。数字健康记录、神经成像、传感器读数和文献,这些都是复杂的、异构的、标签不充分的、经常是无组织的,在当代生物学和医学中都在增长。在属性前面构建预测或排序设计之前,传统的信息检索和统计建模谓词需要进行数据增强,以便从信息中提取有用且更持久的特征。在复杂的材料和不充分的技术理解的情况下,各种各样的问题沿着两个阶段。最新的卷积技术进步为从海量信息中创建端到端教学方法提供了新的、有效的框架。因此,在本文中,我们研究了利用深度技术来改善医学领域的最新研究。我们在综述的基础上提出,深度学习技术可能是将大规模生理数据转化为增强人类能力的手段。此外,我们还提请注意一些缺点以及对更好的技术设计和应用的要求,特别是在主题专家和社会研究人员理解的简单性方面。为了将深度学习模型与自然可解释性连接起来,我们研究了这些问题,并建议创建全面且有意义的可解读架构。
{"title":"Multi-label Classification Performance using Deep Learning","authors":"Snehal Awachat","doi":"10.47164/ijngc.v14i1.1094","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1094","url":null,"abstract":"Understanding and using extensive, elevated, and heterogeneous biological data continues to be a major obstacle in the transformation of medical services.  Digital health records, neuroimaging, sensor readings, and literature, which are all complicated, heterogeneous, inadequately labelled, and frequently unorganized, are all growing in contemporary biology and medicine. Prior to building prediction or sorting designs in front of the attributes, conventional information retrieval and statistical modelling predicates need to do data augmentation to extract useful and more durable features from the information. In the case of complex material and inadequate technical understanding, a variety of problems along both phases. The most recent convolutional technological advancements offer new, efficient frameworks to create end-to-end teaching methods from massive information. Therefore, in paper, we examine the most recent research on using deep techniques to improve the medical field. We propose that deeper learning technologies may be the means of converting large-scale physiological data into enhancing human ability based on the reviewed studies. We additionally draw attention to some drawbacks and the requirement for better technique design and application, particularly in terms of simplicity of comprehension for subject matter experts and social researchers. In order to bridge deeper learning models with natural interpretability, we examine these problems and recommend creating comprehensive and meaningful decipherable architectures.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"24 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77411440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection Technique to trace IP behind VPN/Proxy using Machine Learning 使用机器学习跟踪VPN/代理背后IP的检测技术
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1006
D. Naidu, Madhav Jha
Cybercriminals use a variation of techniques to fleece their digital footprints, that creates a barrier for law enforcement agencies to impossibly catch and prosecute them. With the known universal truth that whenever a machine tries to connect in adversely to target system. The victim’s machine can see only requests coming from the “proxy” or the VPN server. Now as VPN hides IP addresses it leads the network to be redirected through some special configured remote server which are run by a VPN host. As its consequences, the user’s digital footprint is hidden. the footprint of a VPN server is received by the receiver. This challenges the entire organization or one’s personal system to be in risk. One such solution to the problem is to design “Honeypot system” that will trace an IP address running behind VPN/proxy servers. The machine learning algorithm will able to trace the actual IP address with ISP details. The paper discusses a detection mechanism that will dupe the attackers. Showing inability in locating and identifying real honeypot file. The methods were tested on various platforms and technique outperform in detecting attacker’s system smartly using machine learning.
网络犯罪分子使用各种各样的技术来清除他们的数字足迹,这给执法机构创造了一个不可能抓住和起诉他们的障碍。众所周知,每当一台机器试图恶意连接到目标系统时。受害者的机器只能看到来自“代理”或VPN服务器的请求。现在,由于VPN隐藏了IP地址,它导致网络通过一些由VPN主机运行的特殊配置的远程服务器进行重定向。其结果是,用户的数字足迹是隐藏的。VPN服务器的足迹被接收方接收。这会使整个组织或个人系统处于危险之中。一个这样的解决方案是设计“蜜罐系统”,它将跟踪VPN/代理服务器后面运行的IP地址。机器学习算法将能够通过ISP详细信息跟踪实际IP地址。本文讨论了一种能够欺骗攻击者的检测机制。显示无法定位和识别真正的蜜罐文件。这些方法在各种平台上进行了测试,并且在使用机器学习智能检测攻击者系统方面表现出色。
{"title":"Detection Technique to trace IP behind VPN/Proxy using Machine Learning","authors":"D. Naidu, Madhav Jha","doi":"10.47164/ijngc.v14i1.1006","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1006","url":null,"abstract":"Cybercriminals use a variation of techniques to fleece their digital footprints, that creates a barrier for law enforcement agencies to impossibly catch and prosecute them. With the known universal truth that whenever a machine tries to connect in adversely to target system. The victim’s machine can see only requests coming from the “proxy” or the VPN server. Now as VPN hides IP addresses it leads the network to be redirected through some special configured remote server which are run by a VPN host. As its consequences, the user’s digital footprint is hidden. the footprint of a VPN server is received by the receiver. This challenges the entire organization or one’s personal system to be in risk. One such solution to the problem is to design “Honeypot system” that will trace an IP address running behind VPN/proxy servers. The machine learning algorithm will able to trace the actual IP address with ISP details. The paper discusses a detection mechanism that will dupe the attackers. Showing inability in locating and identifying real honeypot file. The methods were tested on various platforms and technique outperform in detecting attacker’s system smartly using machine learning.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"5 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75635866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Detection in Steel Surfaces Using Deep Learning Approaches 基于深度学习方法的钢表面故障检测
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1020
Shubham Joshi, Aditi Mukte, Snehal Jaiswal, Khushboo Khurana
There is sustainable growth in the industries in various developing nations. Quality maintenance of the product under development is an essential part of the product development process. Product quality affects the performance of the product. Various kinds of issues in the manufacturing can impact negatively on the product. Therefore, it is needed to make sure that the manufactured products are fault-free by establishing and employing such softwares that will ultimately bring some ease in the fault detection process. This paper aims to diagnose faults on steel surfaces by using convolutional neural networks and classification by making use of 5 different types of classifiers. They are Support Vector machines, Naive Bayes Classifier, Decision Tree, K-nearest Neighbors, and Random Forest. We have used 4 different types of models namely, Alexnet, InceptionV3, Resnet and VGG16. The testing accuracy was found to be maximum for the VGG16 model which was recorded to be 75.02%. Among the classifiers, the best accuracy was found out with Random Forest and Decision Tree classifiers to be 74.9% and 74.3% respectively. The defects are classified among the 4 categories of defects and are highlighted using image segmentation.
各个发展中国家的工业都有可持续的增长。开发中产品的质量维护是产品开发过程中必不可少的一部分。产品质量影响着产品的性能。制造过程中的各种问题都会对产品产生负面影响。因此,需要通过建立和使用这样的软件来确保制造的产品是无故障的,最终将在故障检测过程中带来一些便利。本文的目的是利用卷积神经网络和5种不同类型的分类器对钢表面进行故障诊断。它们是支持向量机、朴素贝叶斯分类器、决策树、k近邻和随机森林。我们使用了4种不同类型的模型,即Alexnet, InceptionV3, Resnet和VGG16。结果表明,VGG16模型的检测精度最高,达到75.02%。其中随机森林分类器和决策树分类器准确率最高,分别为74.9%和74.3%。将缺陷分为4类,并用图像分割的方法突出显示缺陷。
{"title":"Fault Detection in Steel Surfaces Using Deep Learning Approaches","authors":"Shubham Joshi, Aditi Mukte, Snehal Jaiswal, Khushboo Khurana","doi":"10.47164/ijngc.v14i1.1020","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1020","url":null,"abstract":"There is sustainable growth in the industries in various developing nations. Quality maintenance of the product under development is an essential part of the product development process. Product quality affects the performance of the product. Various kinds of issues in the manufacturing can impact negatively on the product. Therefore, it is needed to make sure that the manufactured products are fault-free by establishing and employing such softwares that will ultimately bring some ease in the fault detection process. This paper aims to diagnose faults on steel surfaces by using convolutional neural networks and classification by making use of 5 different types of classifiers. They are Support Vector machines, Naive Bayes Classifier, Decision Tree, K-nearest Neighbors, and Random Forest. We have used 4 different types of models namely, Alexnet, InceptionV3, Resnet and VGG16. The testing accuracy was found to be maximum for the VGG16 model which was recorded to be 75.02%. Among the classifiers, the best accuracy was found out with Random Forest and Decision Tree classifiers to be 74.9% and 74.3% respectively. The defects are classified among the 4 categories of defects and are highlighted using image segmentation.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"15 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87491941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approach to Automatic Identification and Detection of Aquatic Animal Species 水生动物物种自动识别与检测新方法
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1013
Pratik K.Agrawal, Vaishnavi Kamdi, Ishan Mittal, Pranav Bobde, Amarsingh Kashyap
Marine fisheries contribute greatly to the economic aspects of any country. India, having a coastline of almost 8000 KM, a surplus of fisheries potential could be estimated here. Because of this vast coastal area, active reporting of captured fishes is difficult through manual monitoring. Computer-aided approach is the best suitable option during the active season. This paper focuses on investigating an approach for identifying single as well as multiple aquatic animal species in a single image. Further a responsive web as well as mobile application are developed, in which the ML models are integrated. This will help users to access data as per their use. The method used YOLOv5n, a lightweight object detection algorithm, to detect these species. The trained model yielded mAP@0.5:0.95 intersection over union (IoU), and average precision (AP) for each species. The species’ AP varied as well. Few GFLOPs are used by YOLOv5n. This indicates that it is a scaled-down version capable of running on the 5.1 GFLOP Raspberry Pi 3B+. Despite employing substantially fewer GFLOPs, YOLOv5n outperformed Faster R-CNN.
海洋渔业对任何国家的经济方面都作出了巨大贡献。印度拥有近8000公里的海岸线,在这里可以估计出渔业的剩余潜力。由于这片广阔的沿海地区,通过人工监测很难主动报告捕获的鱼类。在活跃期,计算机辅助方法是最合适的选择。本文重点研究了一种在单幅图像中识别单一和多个水生动物物种的方法。此外,还开发了响应式web和移动应用程序,其中集成了ML模型。这将帮助用户根据他们的使用情况访问数据。该方法使用轻量级目标检测算法YOLOv5n来检测这些物种。训练后的模型得到mAP@0.5:0.95的交集比联合(IoU),和平均精度(AP)为每个物种。该物种的AP也各不相同。YOLOv5n使用的gflop很少。这表明它是一个缩小版,能够在5.1 GFLOP树莓派3B+上运行。尽管使用的GFLOPs大大减少,但YOLOv5n的性能优于更快的R-CNN。
{"title":"Novel Approach to Automatic Identification and Detection of Aquatic Animal Species","authors":"Pratik K.Agrawal, Vaishnavi Kamdi, Ishan Mittal, Pranav Bobde, Amarsingh Kashyap","doi":"10.47164/ijngc.v14i1.1013","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1013","url":null,"abstract":"Marine fisheries contribute greatly to the economic aspects of any country. India, having a coastline of almost 8000 KM, a surplus of fisheries potential could be estimated here. Because of this vast coastal area, active reporting of captured fishes is difficult through manual monitoring. Computer-aided approach is the best suitable option during the active season. This paper focuses on investigating an approach for identifying single as well as multiple aquatic animal species in a single image. Further a responsive web as well as mobile application are developed, in which the ML models are integrated. This will help users to access data as per their use. The method used YOLOv5n, a lightweight object detection algorithm, to detect these species. The trained model yielded mAP@0.5:0.95 intersection over union (IoU), and average precision (AP) for each species. The species’ AP varied as well. Few GFLOPs are used by YOLOv5n. This indicates that it is a scaled-down version capable of running on the 5.1 GFLOP Raspberry Pi 3B+. Despite employing substantially fewer GFLOPs, YOLOv5n outperformed Faster R-CNN.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"25 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78350050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimized Deep Learning Model with Feature Fusion for Brain Tumor Detection 基于特征融合的脑肿瘤检测优化深度学习模型
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1032
Suraj Patil, Dnyaneshwar Kirange
The automatic detection of brain tumor from large volumes of MRI images using deep learning is a issue that necessitates substantial computing resources. So,in this study, a brain tumor detection framework using feature fusion from optimized shallow and deep learning models is proposed that efficiently detects different types of tumors. The human brain is a 3D object and the intensity of abnormal tissue varies as per location. As a result, incorporating surrounding tissue into tumor region can help to discriminate between the type of tumor and its severity. To extract deep characteristics from tumor region and adjacent tissues, deep models such as Inception-V3 is employed using transfer learning. Deep features are especially important in tumour detection, however as the network size grows, certain low-level insights about tumor are lost. As a result, a novel optimized shallow model is designed to extract low-level features. To overcome this limitation of information loss, deep and shallow features are fused. Our extensive simulation and experiment done on a publicly available benchmark dataset shows that an optimized hybrid deep learning model with ROI expansion improves tumor detection accuracy by 9%. These findings support the theory that the tissues adjacent to the tumor contain unique information and feature fusion compensates for information loss.
利用深度学习从大量MRI图像中自动检测脑肿瘤是一个需要大量计算资源的问题。因此,本研究提出了一种基于优化的浅学习和深度学习模型特征融合的脑肿瘤检测框架,可以有效地检测不同类型的肿瘤。人脑是一个三维物体,异常组织的强度随位置的不同而变化。因此,将肿瘤周围组织纳入肿瘤区域有助于区分肿瘤类型及其严重程度。为了从肿瘤区域和邻近组织中提取深度特征,采用了迁移学习的Inception-V3等深度模型。深度特征在肿瘤检测中尤为重要,然而随着网络规模的增长,一些关于肿瘤的低层次信息会丢失。因此,设计了一种新的优化浅层模型来提取底层特征。为了克服这种信息丢失的限制,将深特征和浅特征融合在一起。我们在公开可用的基准数据集上进行的广泛模拟和实验表明,具有ROI扩展的优化混合深度学习模型将肿瘤检测准确率提高了9%。这些发现支持了肿瘤附近组织包含独特信息和特征融合补偿信息丢失的理论。
{"title":"An Optimized Deep Learning Model with Feature Fusion for Brain Tumor Detection","authors":"Suraj Patil, Dnyaneshwar Kirange","doi":"10.47164/ijngc.v14i1.1032","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1032","url":null,"abstract":"The automatic detection of brain tumor from large volumes of MRI images using deep learning is a issue that necessitates substantial computing resources. So,in this study, a brain tumor detection framework using feature fusion from optimized shallow and deep learning models is proposed that efficiently detects different types of tumors. The human brain is a 3D object and the intensity of abnormal tissue varies as per location. As a result, incorporating surrounding tissue into tumor region can help to discriminate between the type of tumor and its severity. To extract deep characteristics from tumor region and adjacent tissues, deep models such as Inception-V3 is employed using transfer learning. Deep features are especially important in tumour detection, however as the network size grows, certain low-level insights about tumor are lost. As a result, a novel optimized shallow model is designed to extract low-level features. To overcome this limitation of information loss, deep and shallow features are fused. Our extensive simulation and experiment done on a publicly available benchmark dataset shows that an optimized hybrid deep learning model with ROI expansion improves tumor detection accuracy by 9%. These findings support the theory that the tissues adjacent to the tumor contain unique information and feature fusion compensates for information loss.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83002782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
English to Hindi Cross-Lingual Text Summarizer using TextRank Algorithm 使用TextRank算法的英语到印地语跨语言文本摘要器
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1025
S. Rawat, Kavita B. Kalambe, Sagarika Jaywant, Lakshita Werulkar, Mukul Barbate, Tarrun Jaiswalt
Cross-Lingual Summarizer develops a gist of the extract written in English in the National Language of India Hindi. This helps non-anglophonic people to understand what the text says in Hindi. The extractive method of summarization is being used in this paper for summarizing the article. The summary generated in English is then translated into Hindi and made available for Hindi Readers. The Hindi readers get the heart of the article they want to read. Due to the Internet’s explosive growth, access to a vast amount of information is now efficient but getting harder and harder. An approach to text extraction summarization that captures the aboutness of the text document was discussed in this paper. One of the many uses for natural language processing (NLP) that significantly affects our daily lives is text summarization. Who has the time to read through complete articles, documents, or books to determine whether they are helpful with the expansion of digital media and the profusion of articles published? The technique was created using TextRank, which was determined using the idea of PageRank established for each page on a website. The presented approach builds a graph with sentences as nodes and the weight of the edge connecting two sentences as its nodes. Modified inverse sentence-cosine frequency similarity gives different words in a sentence different weights. The success of the procedure is demonstrated by the performance evaluation that supported the summary technique.
跨语言总结器开发的摘录的要点写在印度的国家语言印地语的英语。这有助于非英语国家的人理解印度语的文本内容。本文采用摘要提取法对文章进行总结。用英语生成的摘要然后被翻译成印地语,并提供给印地语读者。印度语读者能读到他们想读的文章的核心。由于互联网的爆炸式增长,获取大量的信息现在是高效的,但越来越难。本文讨论了一种捕获文本文档的相关度的文本提取摘要方法。自然语言处理(NLP)的众多用途之一是文本摘要,它对我们的日常生活产生了重大影响。谁有时间通读完整的文章、文件或书籍,以确定它们是否有助于数字媒体的扩张和大量发表的文章?该技术是使用TextRank创建的,它是使用为网站上的每个页面建立PageRank的想法确定的。该方法构建了一个以句子为节点的图,以连接两个句子的边的权重为节点。修正逆句-余弦频率相似度赋予句子中不同的词不同的权值。支持摘要技术的性能评估证明了该过程的成功。
{"title":"English to Hindi Cross-Lingual Text Summarizer using TextRank Algorithm","authors":"S. Rawat, Kavita B. Kalambe, Sagarika Jaywant, Lakshita Werulkar, Mukul Barbate, Tarrun Jaiswalt","doi":"10.47164/ijngc.v14i1.1025","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1025","url":null,"abstract":"Cross-Lingual Summarizer develops a gist of the extract written in English in the National Language of India Hindi. This helps non-anglophonic people to understand what the text says in Hindi. The extractive method of summarization is being used in this paper for summarizing the article. The summary generated in English is then translated into Hindi and made available for Hindi Readers. The Hindi readers get the heart of the article they want to read. Due to the Internet’s explosive growth, access to a vast amount of information is now efficient but getting harder and harder. An approach to text extraction summarization that captures the aboutness of the text document was discussed in this paper. One of the many uses for natural language processing (NLP) that significantly affects our daily lives is text summarization. Who has the time to read through complete articles, documents, or books to determine whether they are helpful with the expansion of digital media and the profusion of articles published? The technique was created using TextRank, which was determined using the idea of PageRank established for each page on a website. The presented approach builds a graph with sentences as nodes and the weight of the edge connecting two sentences as its nodes. Modified inverse sentence-cosine frequency similarity gives different words in a sentence different weights. The success of the procedure is demonstrated by the performance evaluation that supported the summary technique.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"64 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84320399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain 一种基于分散区块链的高效用户认证方案
IF 0.3 Pub Date : 2023-02-15 DOI: 10.47164/ijngc.v14i1.1021
Narayani Singh, Rahul Patekar, G. Kedia, Neha Tirpude
Peer-to-peer network principles are the foundation of Blockchain Cybersecurity. Blockchain creates a reliable verification method that protects against online dangers. Cryptocurrency on the Blockchain is supported by three pillars: network availability, secrecy, and integrity. A third route toward stronger security, one that is less traveled and not nearly as inviting to attackers, is provided by Blockchain. This method lessens risks, offers robust encryption, and more successfully confirms the ownership and integrity of data. Some passwords frequently referred to as the weakest link in Cybersecurity, may even be unnecessary without them. So we aim to build a secure user authentication system using blockchain and also learn about how SCADA systems work in healthcare.
点对点网络原则是区块链网络安全的基础。区块链创建了一种可靠的验证方法,可以防止在线危险。区块链上的加密货币由三大支柱支撑:网络可用性、保密性和完整性。第三条通往更强安全性的途径是区块链,这条途径很少有人涉足,对攻击者也不那么有吸引力。这种方法降低了风险,提供了健壮的加密,并且更成功地确认了数据的所有权和完整性。一些经常被认为是网络安全中最薄弱环节的密码,如果没有它们,甚至可能是不必要的。因此,我们的目标是使用区块链构建一个安全的用户身份验证系统,并了解SCADA系统如何在医疗保健中工作。
{"title":"Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain","authors":"Narayani Singh, Rahul Patekar, G. Kedia, Neha Tirpude","doi":"10.47164/ijngc.v14i1.1021","DOIUrl":"https://doi.org/10.47164/ijngc.v14i1.1021","url":null,"abstract":"Peer-to-peer network principles are the foundation of Blockchain Cybersecurity. Blockchain creates a reliable verification method that protects against online dangers. Cryptocurrency on the Blockchain is supported by three pillars: network availability, secrecy, and integrity. A third route toward stronger security, one that is less traveled and not nearly as inviting to attackers, is provided by Blockchain. This method lessens risks, offers robust encryption, and more successfully confirms the ownership and integrity of data. Some passwords frequently referred to as the weakest link in Cybersecurity, may even be unnecessary without them. So we aim to build a secure user authentication system using blockchain and also learn about how SCADA systems work in healthcare.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"10 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82140673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Next-Generation Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1