首页 > 最新文献

International Journal of Next-Generation Computing最新文献

英文 中文
Improved League Championship Algorithm (ILCA) for Load Balancing in Cloud Computing 基于改进联赛冠军算法(ILCA)的云计算负载均衡
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.930
A. Gaikwad, Kavita Singh
You can’t obtain the outcomes you need without planning, thus it’s at the heart of cloud computing. This article’s major goal is to decrease value-added time, increase resource utilisation, and make cloud services viable for a single activity. In recent years, metaheuristic algorithms have drew attention to the correct functioning of work scheduling algorithms among the many job scheduling techniques. With sports leagues, the algorithm based on the League Championship (LCA) is fascinating because it can be used to identify the best team/task for programming.This article uses the Improved League Championship Algorithm (ILCA) to schedule tasks, reducing deployment time, cloud usage, and cost. The ILCA is implemented through the Cloudsim simulator and the Java programming language with a nonpreventive planning strategy. ILCA also enhances economies of scale and minimises the value of using the cloud. As it has proven to be versatile in terms of time to manufacture, resource usage and economics, ILCA could be a good candidate for a cloud broker as it has proven to be versatile in termsof time to manufacture, resource usage and economics usage.
如果没有规划,您就无法获得所需的结果,因此它是云计算的核心。本文的主要目标是减少增值时间,提高资源利用率,并使云服务适用于单个活动。近年来,在众多作业调度技术中,元启发式算法引起了人们对作业调度算法正确运行的关注。对于体育联盟来说,基于联赛冠军(LCA)的算法非常吸引人,因为它可以用来确定最适合编程的团队/任务。本文使用改进的联赛冠军算法(ILCA)来安排任务,减少部署时间、云使用和成本。ILCA通过Cloudsim模拟器和Java编程语言实现,采用非预防性规划策略。ILCA还提高了规模经济,并最大限度地降低了使用云的价值。由于它已被证明在制造时间、资源使用和经济方面是通用的,ILCA可能是云代理的一个很好的候选者,因为它已被证明在制造时间、资源使用和经济使用方面是通用的。
{"title":"Improved League Championship Algorithm (ILCA) for Load Balancing in Cloud Computing","authors":"A. Gaikwad, Kavita Singh","doi":"10.47164/ijngc.v13i5.930","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.930","url":null,"abstract":"You can’t obtain the outcomes you need without planning, thus it’s at the heart of cloud computing. This article’s major goal is to decrease value-added time, increase resource utilisation, and make cloud services viable for a single activity. In recent years, metaheuristic algorithms have drew attention to the correct functioning of work scheduling algorithms among the many job scheduling techniques. With sports leagues, the algorithm based on the League Championship (LCA) is fascinating because it can be used to identify the best team/task for programming.This article uses the Improved League Championship Algorithm (ILCA) to schedule tasks, reducing deployment time, cloud usage, and cost. The ILCA is implemented through the Cloudsim simulator and the Java programming language with a nonpreventive planning strategy. ILCA also enhances economies of scale and minimises the value of using the cloud. As it has proven to be versatile in terms of time to manufacture, resource usage and economics, ILCA could be a good candidate for a cloud broker as it has proven to be versatile in termsof time to manufacture, resource usage and economics usage.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"50 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90593897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lost + Found: The Lost Angel Investigator 失物招领:失落的天使调查员
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.906
Harsh Shrirame, Bhavesh Kewalramani, Daksh Kothari, Darshan Jawandhiya, Rina Damdoo
Each year, a large number of youngsters are found missing in India. Among them, a large number of cases are never solved due to various difficulties faced by the police ranging from heavy paperwork to lacking technology. Therefore, one of this work’s key goals is to provide an application that may assist people whose children have been missing and rescued by the public. This will also reduce the time required to find the missing child to reunite the child with their loved ones as soon as possible. The pictures of child victims can be uploaded by the citizens along with landmarks, to our web app. The photographs will be matched to the missing child’s registered photographs if existing in the database. A deep neural network model is trained to locate the lost youngster using a facial picture uploaded by the citizens. Multi-Tasking CNN (MTCNN), the most efficient DNN technique for image-based apps, is used for facial Identification. The images were passed through an augmentation layer to get images of different orientations, brightness, and contrast, which were used ahead to train the EfficientNetB0 model. This model is then used to recognize faces in photographs. Using the MTCNN model for facial recognition with EfficientNetB0 and developing it yields a deep learning model that is free from all types of distortion. The model’s training accuracy is 96.66 percent and its testing accuracy is 76.81 percent, implying that there is approximately 77 percent possibility of finding a match for the missing kid. It was evaluated using 25 Child classes. Each Child class has around 15 to 20 images. These images are taken with different backgrounds and real-time settings so that model will work even when noise is present in the image.
印度每年都有大量儿童失踪。其中,由于警方面临文书工作繁重、技术匮乏等各种困难,大量案件从未侦破。因此,这项工作的主要目标之一是提供一个应用程序,可以帮助那些失踪的孩子被公众救出的人。这也将减少寻找失踪儿童所需的时间,使儿童尽快与亲人团聚。市民可以将受害儿童的照片和地标一起上传到我们的网络应用程序。如果数据库中存在失踪儿童的注册照片,这些照片将与之匹配。通过训练一个深度神经网络模型,利用市民上传的面部照片来定位走失的孩子。多任务CNN (MTCNN)是基于图像的应用程序中最有效的深度神经网络技术,用于面部识别。这些图像经过增强层得到不同方向、亮度和对比度的图像,这些图像被预先用于训练EfficientNetB0模型。然后用这个模型来识别照片中的人脸。将MTCNN模型与EfficientNetB0一起用于面部识别,并对其进行开发,产生了一个没有各种类型失真的深度学习模型。该模型的训练准确率为96.66%,测试准确率为76.81%,这意味着为失踪的孩子找到匹配的可能性约为77%。它是用25个Child类来评估的。每个Child类大约有15到20张图片。这些图像是在不同的背景和实时设置下拍摄的,因此即使图像中存在噪声,模型也可以工作。
{"title":"Lost + Found: The Lost Angel Investigator","authors":"Harsh Shrirame, Bhavesh Kewalramani, Daksh Kothari, Darshan Jawandhiya, Rina Damdoo","doi":"10.47164/ijngc.v13i5.906","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.906","url":null,"abstract":"Each year, a large number of youngsters are found missing in India. Among them, a large number of cases are never solved due to various difficulties faced by the police ranging from heavy paperwork to lacking technology. Therefore, one of this work’s key goals is to provide an application that may assist people whose children have been missing and rescued by the public. This will also reduce the time required to find the missing child to reunite the child with their loved ones as soon as possible. The pictures of child victims can be uploaded by the citizens along with landmarks, to our web app. The photographs will be matched to the missing child’s registered photographs if existing in the database. A deep neural network model is trained to locate the lost youngster using a facial picture uploaded by the citizens. Multi-Tasking CNN (MTCNN), the most efficient DNN technique for image-based apps, is used for facial Identification. The images were passed through an augmentation layer to get images of different orientations, brightness, and contrast, which were used ahead to train the EfficientNetB0 model. This model is then used to recognize faces in photographs. Using the MTCNN model for facial recognition with EfficientNetB0 and developing it yields a deep learning model that is free from all types of distortion. The model’s training accuracy is 96.66 percent and its testing accuracy is 76.81 percent, implying that there is approximately 77 percent possibility of finding a match for the missing kid. It was evaluated using 25 Child classes. Each Child class has around 15 to 20 images. These images are taken with different backgrounds and real-time settings so that model will work even when noise is present in the image.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"51 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90850833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart College Campus Recruitment System 智慧高校校园招聘系统
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.970
Dr. Purshottam J. Assudani, Dr. Rakesh K. Kadu, Rizwan Sheikh, Tushar Khanna
The demand for an online college job board network and its copy in relating college pupils and careervacancies Traditionally, career sites are used by talent managers for candid exploration and recruitment. This task is based on an employment portal organized for one of the well-known engineering campuses and is a variation of a job council designed precisely for campus students. Providing job introduction riding to the talents of students and services such as candidate filtering for companies to survey candidates will help learners and companies to find suitable aspirants for the job. We aim to be beneficial. Keywords— Natural Language Processing, Recruitment, Artificial Intelligence, Knowledge Base
传统上,人才管理人员使用职业网站进行坦率的探索和招聘。这个任务是基于一个为一个著名的工程校园组织的就业门户网站,是一个专门为校园学生设计的就业委员会的变体。为学生的才能提供工作介绍,为公司调查候选人提供候选人筛选等服务,可以帮助学习者和公司找到合适的有志者。我们的目标是有益的。关键词:自然语言处理,招聘,人工智能,知识库
{"title":"Smart College Campus Recruitment System","authors":"Dr. Purshottam J. Assudani, Dr. Rakesh K. Kadu, Rizwan Sheikh, Tushar Khanna","doi":"10.47164/ijngc.v13i5.970","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.970","url":null,"abstract":"The demand for an online college job board network and its copy in relating college pupils and careervacancies Traditionally, career sites are used by talent managers for candid exploration and recruitment. This task is based on an employment portal organized for one of the well-known engineering campuses and is a variation of a job council designed precisely for campus students. Providing job introduction riding to the talents of students and services such as candidate filtering for companies to survey candidates will help learners and companies to find suitable aspirants for the job. We aim to be beneficial. Keywords— Natural Language Processing, Recruitment, Artificial Intelligence, Knowledge Base","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"83 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83966743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel approach to Create Human Faces with DCGAN for Face Recognition 基于DCGAN的人脸识别新方法
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.936
Roshni Khedgaonkar, Kavita Singh, Sunny Mate
Due to the remarkable data generation abilities of the generative models, many generative adversarial networks (GAN) models have been developed, and several real-world applications in computer vision and machine learning have emerged. The generative models have received significant attention in the field of unsupervised learning via this new and useful framework. In spite of GAN's outstanding performance, steady training remains a challenge. In this model, use of Deep Convolutional Generative Adversarial Networks is incorporated, Main aim is to produce human faces from unlabeled data. Face generation has a wide range of applications in image processing, entertainment, and other industries. Extensive simulation is performed on the CelebA     dataset. Key focus is to successfully construct human faces from the unlabeled data and random noise and achieved average loss of 1.115% and 0.5894 % for generator and discriminator respectively.
由于生成模型具有卓越的数据生成能力,许多生成对抗网络(GAN)模型已经被开发出来,并且在计算机视觉和机器学习方面已经出现了一些实际应用。通过这个新的有用的框架,生成模型在无监督学习领域受到了极大的关注。尽管GAN表现出色,但稳定的训练仍然是一个挑战。在该模型中,引入了深度卷积生成对抗网络的使用,主要目的是从未标记的数据中生成人脸。人脸生成在图像处理、娱乐等行业有着广泛的应用。对CelebA数据集进行了广泛的模拟。关键是成功地从未标记的数据和随机噪声中构建人脸,并实现了生成器和鉴别器的平均损失分别为1.115%和0.5894%。
{"title":"Novel approach to Create Human Faces with DCGAN for Face Recognition","authors":"Roshni Khedgaonkar, Kavita Singh, Sunny Mate","doi":"10.47164/ijngc.v13i5.936","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.936","url":null,"abstract":"Due to the remarkable data generation abilities of the generative models, many generative adversarial networks (GAN) models have been developed, and several real-world applications in computer vision and machine learning have emerged. The generative models have received significant attention in the field of unsupervised learning via this new and useful framework. In spite of GAN's outstanding performance, steady training remains a challenge. In this model, use of Deep Convolutional Generative Adversarial Networks is incorporated, Main aim is to produce human faces from unlabeled data. Face generation has a wide range of applications in image processing, entertainment, and other industries. Extensive simulation is performed on the CelebA     dataset. Key focus is to successfully construct human faces from the unlabeled data and random noise and achieved average loss of 1.115% and 0.5894 % for generator and discriminator respectively.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"7 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82779716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Aware Job Scheduling and Simulation in a Cloud Datacenter 云数据中心中能源感知作业调度与仿真
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.950
Purushottam Assudani, Mehvash Khan, Mukesh Kumar, Tejas V. Bhutada
Virtualization technology is used by cloud systems for the users to utilize cloud resources through Virtual Machines.These VM’s process the task requests made by users. Ever since inefficient hardware utilization is the concernfor the future and the environment, efficient work load balancing and allocation of VMs helps to bring down thehardware usage and results to efficient working. That being said, this paper proposes task scheduling frameworkwhere the task will be assigned to a VMs running on the active hosts(servers) through preemption as required andclassification of the cloudlets. The algorithm that we have taken into consideration will categorize the cloudletsinto three distinct types and allocate them a VM based on first come, first served resource time in regards to thatparticular host. This in turn will reduce the energy consumption by having lesser machines running in the activestate meanwhile preserving efficient utilization of the active servers. Such kind of simulations are fairly achievedusing the CloudSim framework
虚拟化技术是云系统使用的一种技术,用户可以通过虚拟机来利用云资源。这些虚拟机处理用户发出的任务请求。由于低效率的硬件利用率是对未来和环境的关注,有效的工作负载平衡和虚拟机分配有助于降低硬件使用和结果的高效工作。也就是说,本文提出了一个任务调度框架,其中任务将通过需要的抢占和云的分类分配给运行在活动主机(服务器)上的虚拟机。我们所考虑的算法将把cloudlets分为三种不同的类型,并根据特定主机的先到先服务的资源时间为它们分配VM。这反过来又会通过让更少的机器在活动状态下运行,同时保持对活动服务器的有效利用,从而减少能源消耗。使用CloudSim框架可以很好地实现这种模拟
{"title":"Energy Aware Job Scheduling and Simulation in a Cloud Datacenter","authors":"Purushottam Assudani, Mehvash Khan, Mukesh Kumar, Tejas V. Bhutada","doi":"10.47164/ijngc.v13i5.950","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.950","url":null,"abstract":"Virtualization technology is used by cloud systems for the users to utilize cloud resources through Virtual Machines.These VM’s process the task requests made by users. Ever since inefficient hardware utilization is the concernfor the future and the environment, efficient work load balancing and allocation of VMs helps to bring down thehardware usage and results to efficient working. That being said, this paper proposes task scheduling frameworkwhere the task will be assigned to a VMs running on the active hosts(servers) through preemption as required andclassification of the cloudlets. The algorithm that we have taken into consideration will categorize the cloudletsinto three distinct types and allocate them a VM based on first come, first served resource time in regards to thatparticular host. This in turn will reduce the energy consumption by having lesser machines running in the activestate meanwhile preserving efficient utilization of the active servers. Such kind of simulations are fairly achievedusing the CloudSim framework","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"37 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74521013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLAGIARISM DETECTION IN PROGRAMMING USING PERFORMANCE ANALYZING FEATURES 基于性能分析特征的编程剽窃检测
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.964
D.S. Adane, Abhishek Angale, Ayush Singh, Rituj Aryan, Sumeet Yadav
In recent years, plagiarism that uses the code snippets or program of others without permission has become a social problem. It is widely spread from very familiar student reports to worldwide academic papers. In this paper, we deal with plagiarism in programming assignments, and explain the plagiarism patterns often found in text. Existing plagiarism detection tools utilize string matching algorithms to calculate the plagiarism. We have brought to light the problems associated with existing tools and propose a method to rectify them efficiently with the help of algorithms proposed in the paper. To the existing detection method, we combine some heuristics which are estimation of time complexity and loop detection, to improve the accuracy of the plagiarized sections and propose it as a plagiarism detection method.
近年来,未经许可使用他人的代码片段或程序的抄袭已成为一个社会问题。它广泛传播,从非常熟悉的学生报告到世界范围的学术论文。在本文中,我们处理了编程作业中的抄袭,并解释了在文本中经常发现的抄袭模式。现有的抄袭检测工具使用字符串匹配算法来计算抄袭。我们揭示了与现有工具相关的问题,并提出了一种利用本文提出的算法有效纠正这些问题的方法。针对现有的检测方法,我们结合了时间复杂度估计和环路检测等启发式方法,提高了抄袭部分的检测精度,提出了一种抄袭检测方法。
{"title":"PLAGIARISM DETECTION IN PROGRAMMING USING PERFORMANCE ANALYZING FEATURES","authors":"D.S. Adane, Abhishek Angale, Ayush Singh, Rituj Aryan, Sumeet Yadav","doi":"10.47164/ijngc.v13i5.964","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.964","url":null,"abstract":"In recent years, plagiarism that uses the code snippets or program of others without permission has become a social problem. It is widely spread from very familiar student reports to worldwide academic papers. In this paper, we deal with plagiarism in programming assignments, and explain the plagiarism patterns often found in text. Existing plagiarism detection tools utilize string matching algorithms to calculate the plagiarism. We have brought to light the problems associated with existing tools and propose a method to rectify them efficiently with the help of algorithms proposed in the paper. To the existing detection method, we combine some heuristics which are estimation of time complexity and loop detection, to improve the accuracy of the plagiarized sections and propose it as a plagiarism detection method.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77245917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object Detection using Speech Recognition 使用语音识别的目标检测
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.974
Chetana B. Thaokar, Gayatri Ladsawangikar, Tanaya Wadibhasme, Sandeep Sureka
Nearly all practical applications, including autonomous navigation, visual systems, face recognition, and more, rely on object detection. In this paper, object detection and speech recognition are combined to help visually impaired people who want to use voice commands to find a certain object. People who are blind or visually challenged can move more independently if they are aware of their surroundings. With the use of the OpenCV libraries, a model has been implemented, and good results have been obtained. In this paper, a thorough review of object detection employing region-based conventional neural network (CNN)- based learning systems for practical applications has been conducted. This study examines the various object identification processes utilizing YOLOV4 object detection techniques and talks through detection, including a speech recognition system that was created by transcribing spoken language into text.
几乎所有的实际应用,包括自主导航、视觉系统、人脸识别等,都依赖于目标检测。本文将物体检测与语音识别相结合,帮助视障人士使用语音命令找到特定的物体。如果盲人或视力障碍的人能意识到周围的环境,他们就能更独立地行动。利用OpenCV库实现了一个模型,并取得了良好的效果。本文对基于区域的传统神经网络(CNN)学习系统在实际应用中的目标检测进行了全面的综述。本研究考察了利用YOLOV4对象检测技术的各种对象识别过程,并通过检测进行讨论,包括通过将口语转录成文本创建的语音识别系统。
{"title":"Object Detection using Speech Recognition","authors":"Chetana B. Thaokar, Gayatri Ladsawangikar, Tanaya Wadibhasme, Sandeep Sureka","doi":"10.47164/ijngc.v13i5.974","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.974","url":null,"abstract":"Nearly all practical applications, including autonomous navigation, visual systems, face recognition, and more, rely on object detection. In this paper, object detection and speech recognition are combined to help visually impaired people who want to use voice commands to find a certain object. People who are blind or visually challenged can move more independently if they are aware of their surroundings. With the use of the OpenCV libraries, a model has been implemented, and good results have been obtained. In this paper, a thorough review of object detection employing region-based conventional neural network (CNN)- based learning systems for practical applications has been conducted. This study examines the various object identification processes utilizing YOLOV4 object detection techniques and talks through detection, including a speech recognition system that was created by transcribing spoken language into text.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"41 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88593335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice Based Authentication System for Web Applications using Machine Learning 使用机器学习的基于语音的Web应用程序认证系统
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.966
Rakesh K Kadu, Purshottam J Assudani, Sahil Bhojane, Tanish Agrawal, Vidhi Siddhawar, Yash Kale
Due to security concerns, the biometric trend is being used in many systems. Biometric authentication is a cheap, easy, and reliable technology for multi-factor authentication. Cryptosystems are one such example of using biometric data. However, this could be risky as biometric information is saved for authentication purposes. Therefore, voice biometric systems provide more efficient security and unique identity than commonly used biometric systems. Although, speech recognition-based authentication systems suffer from replay attacks. In this paper, we implement and analyze a text-independent voice-based biometric authentication system based on the randomly generated input text. Since the prompted text phrase is not known to the speaker in advance, it is difficult to launch replay attacks. The system uses Mel-Frequency Cepstrum Coefficients (MFCC) to extract speech features and Gaussian Mixture Models (GMM) for speaker modeling.
出于安全考虑,许多系统都采用了生物识别技术。生物识别身份验证是一种廉价、简单、可靠的多因素身份验证技术。密码系统就是使用生物特征数据的一个例子。然而,这可能是有风险的,因为生物识别信息是为了身份验证而保存的。因此,语音生物识别系统比常用的生物识别系统提供更有效的安全性和独特的身份。尽管如此,基于语音识别的身份验证系统遭受重放攻击。本文基于随机生成的输入文本,实现并分析了一种与文本无关的基于语音的生物识别认证系统。由于提示的文本短语事先不为说话者所知,因此很难发起重放攻击。该系统使用Mel-Frequency倒频谱系数(MFCC)提取语音特征,并使用高斯混合模型(GMM)对说话者进行建模。
{"title":"Voice Based Authentication System for Web Applications using Machine Learning","authors":"Rakesh K Kadu, Purshottam J Assudani, Sahil Bhojane, Tanish Agrawal, Vidhi Siddhawar, Yash Kale","doi":"10.47164/ijngc.v13i5.966","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.966","url":null,"abstract":"Due to security concerns, the biometric trend is being used in many systems. Biometric authentication is a cheap, easy, and reliable technology for multi-factor authentication. Cryptosystems are one such example of using biometric data. However, this could be risky as biometric information is saved for authentication purposes. Therefore, voice biometric systems provide more efficient security and unique identity than commonly used biometric systems. Although, speech recognition-based authentication systems suffer from replay attacks. In this paper, we implement and analyze a text-independent voice-based biometric authentication system based on the randomly generated input text. Since the prompted text phrase is not known to the speaker in advance, it is difficult to launch replay attacks. The system uses Mel-Frequency Cepstrum Coefficients (MFCC) to extract speech features and Gaussian Mixture Models (GMM) for speaker modeling.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"7 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74919592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Diseases in Tomato Plant using Machine Learning 基于机器学习的番茄病害检测
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.941
Anshul Sharma, Ashish Chandak, Aryan Khandelwal, Raunak Gandhi
A major part of the Indian economy relies on agriculture, thus identification of any diseased crop in the initial phase is very important as these diseases cause a significant drop in agricultural production and also affect the economy of the country. Tomato crops are susceptible to various diseases which may be caused due to transmission of diseases through Air or Soil. We have tried to automate the procedure of detection of diseases in the Tomato Plant by studying several attributes related to the leaf of the plant. Using various machine learning algorithms such as Support Vector Machine (SVM), Convolutional Neural Network (CNN), ResNet, and InceptionV3 we have trained the model, and based on the results obtained we have evaluated and compared the performance of these algorithms on different features set. For the dataset we had 10 classes (healthy and other unhealthy classes) having a total of 18,450 images for the training of the models. After implementing all of the algorithms and comparing their results we found that the ResNet was most appropriate for extracting distinct attributes from images. The trained models can be used to detect diseases in Tomato Plant timely and automatically.
印度经济的主要部分依赖于农业,因此在初始阶段识别任何患病作物是非常重要的,因为这些疾病会导致农业生产大幅下降,也会影响该国的经济。番茄作物易受各种疾病的影响,这些疾病可能是通过空气或土壤传播的。我们试图通过研究番茄叶片相关的几个属性来实现番茄病害检测过程的自动化。使用各种机器学习算法,如支持向量机(SVM)、卷积神经网络(CNN)、ResNet和InceptionV3,我们对模型进行了训练,并根据获得的结果评估和比较了这些算法在不同特征集上的性能。对于数据集,我们有10个类(健康类和其他不健康类),总共有18450张图像用于模型的训练。在实现了所有算法并比较了它们的结果后,我们发现ResNet最适合从图像中提取不同的属性。所建立的模型可用于番茄植株病害的实时自动检测。
{"title":"Detection of Diseases in Tomato Plant using Machine Learning","authors":"Anshul Sharma, Ashish Chandak, Aryan Khandelwal, Raunak Gandhi","doi":"10.47164/ijngc.v13i5.941","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.941","url":null,"abstract":"A major part of the Indian economy relies on agriculture, thus identification of any diseased crop in the initial phase is very important as these diseases cause a significant drop in agricultural production and also affect the economy of the country. Tomato crops are susceptible to various diseases which may be caused due to transmission of diseases through Air or Soil. We have tried to automate the procedure of detection of diseases in the Tomato Plant by studying several attributes related to the leaf of the plant. Using various machine learning algorithms such as Support Vector Machine (SVM), Convolutional Neural Network (CNN), ResNet, and InceptionV3 we have trained the model, and based on the results obtained we have evaluated and compared the performance of these algorithms on different features set. For the dataset we had 10 classes (healthy and other unhealthy classes) having a total of 18,450 images for the training of the models. After implementing all of the algorithms and comparing their results we found that the ResNet was most appropriate for extracting distinct attributes from images. The trained models can be used to detect diseases in Tomato Plant timely and automatically.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"51 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90777345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Salp Swarm Optimization-based Fuzzy Centroid Region Growing for Liver Tumor Segmentation and Deep Learning Oriented Classification 基于改进Salp群优化的模糊质心区域生长的肝脏肿瘤分割和面向深度学习的分类
IF 0.3 Pub Date : 2022-11-26 DOI: 10.47164/ijngc.v13i5.902
Ramchand Hablani, Suraj Patil, Dnyaneshwar Kirange
Due to heterogenous shape of liver, the segmentation and classification of liver is challenging task. Therefore, Computer-Aided Diagnosis (CAD) is employed for predictive decision making for liver diagnosis. The major intuition of this paper is to detect liver cancer in a precise manner by automatic approach. The developed model initially collects the standard benchmark LiTS dataset, and image preprocessing is done by three techniques like Histogram equalization for contrast enhancement, and median filtering and Anisotropic diffusion filtering for noise removal. Further, the Adaptive thresholding is adopted to perform the liver segmentation. As a novelty, optimized Fuzzy centroid-based region growing model is proposed for tumor segmentation in liver. The main objective of thistumor segmentation model is to maximize the entropy by optimizing the fuzzy centroid and threshold of region growing using Mean Fitness-based Salp Swarm Optimization Algorithm (MF-SSA). From segmented tumor, the features like Local Directional Pattern (LDP) and Gray Level Co-occurrence Matrix (GLCM) are extracted. The extracted features are given as input to NN, and segmented tumor is given to Convolutional Neural Network (CNN). The AND bit operation to both of the outputs obtained from NN and CNN confirms the healthy and unhealthy CT images. Since the number of hidden neurons makes an effect on final classification output, the optimization of neurons is done using MF-SSA. From the experimental analysis, it is confirmed that the proposed model is better as compared with state of art results of previous study can assist radiologists in tumor diagnosis from CT scan images.
由于肝脏形状的异质性,肝脏的分割和分类是一项具有挑战性的任务。因此,计算机辅助诊断(CAD)被用于肝脏诊断的预测性决策。本文的主要目的是通过自动方法对肝癌进行精确的检测。该模型首先收集标准基准LiTS数据集,通过直方图均衡化(Histogram equalization)增强对比度,中值滤波和各向异性扩散滤波(Anisotropic diffusion filtering)去噪等三种技术对图像进行预处理。进一步,采用自适应阈值分割进行肝脏分割。作为一种新颖的基于模糊质心的区域生长优化模型,提出了一种用于肝脏肿瘤分割的方法。该肿瘤分割模型的主要目标是利用Mean Fitness-based Salp Swarm Optimization Algorithm (MF-SSA)对区域生长的模糊质心和阈值进行优化,从而实现熵的最大化。从分割的肿瘤中提取局部方向模式(LDP)和灰度共生矩阵(GLCM)等特征。将提取的特征作为神经网络的输入,将分割后的肿瘤输入到卷积神经网络(CNN)。对从NN和CNN得到的输出进行与位运算,确定健康和不健康的CT图像。由于隐藏神经元的数量对最终的分类输出有影响,因此使用MF-SSA对神经元进行优化。通过实验分析,证实了所提出的模型优于现有的研究成果,可以辅助放射科医师根据CT扫描图像进行肿瘤诊断。
{"title":"Improved Salp Swarm Optimization-based Fuzzy Centroid Region Growing for Liver Tumor Segmentation and Deep Learning Oriented Classification","authors":"Ramchand Hablani, Suraj Patil, Dnyaneshwar Kirange","doi":"10.47164/ijngc.v13i5.902","DOIUrl":"https://doi.org/10.47164/ijngc.v13i5.902","url":null,"abstract":"Due to heterogenous shape of liver, the segmentation and classification of liver is challenging task. Therefore, Computer-Aided Diagnosis (CAD) is employed for predictive decision making for liver diagnosis. The major intuition of this paper is to detect liver cancer in a precise manner by automatic approach. The developed model initially collects the standard benchmark LiTS dataset, and image preprocessing is done by three techniques like Histogram equalization for contrast enhancement, and median filtering and Anisotropic diffusion filtering for noise removal. Further, the Adaptive thresholding is adopted to perform the liver segmentation. As a novelty, optimized Fuzzy centroid-based region growing model is proposed for tumor segmentation in liver. The main objective of thistumor segmentation model is to maximize the entropy by optimizing the fuzzy centroid and threshold of region growing using Mean Fitness-based Salp Swarm Optimization Algorithm (MF-SSA). From segmented tumor, the features like Local Directional Pattern (LDP) and Gray Level Co-occurrence Matrix (GLCM) are extracted. The extracted features are given as input to NN, and segmented tumor is given to Convolutional Neural Network (CNN). The AND bit operation to both of the outputs obtained from NN and CNN confirms the healthy and unhealthy CT images. Since the number of hidden neurons makes an effect on final classification output, the optimization of neurons is done using MF-SSA. From the experimental analysis, it is confirmed that the proposed model is better as compared with state of art results of previous study can assist radiologists in tumor diagnosis from CT scan images.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"49 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80950957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Next-Generation Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1