Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.
{"title":"Restoring and Enhancing Degraded Underwater Pipelines for Identifying and Detecting Corrosion","authors":"Vaibhav A. Parjane, Mohit Gangwar","doi":"10.3233/apc210249","DOIUrl":"https://doi.org/10.3233/apc210249","url":null,"abstract":"Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya
The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.
{"title":"Real Time Tracing and Alerting System for Vehicles and Children to Ensure Safety and Security Using Labview","authors":"Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya","doi":"10.3233/apc210177","DOIUrl":"https://doi.org/10.3233/apc210177","url":null,"abstract":"The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan
The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology
{"title":"Deployment of Computer Assisted Instruction in Higher Educational Organization","authors":"N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan","doi":"10.3233/apc210229","DOIUrl":"https://doi.org/10.3233/apc210229","url":null,"abstract":"The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
India is agriculture land and major revenue manufacturing sector. However, because of amendment in temporal parameters and uncertainty in climate directly have an effect on quality and amount of the assembly and maintenance of crops. Also, quality even a lot of degrade once the crops area unit infected by any malady. The main focus of this analysis in agriculture is to increment the crop quality and potency at lower price and gain profit as result of in India the majority of the population depends on agriculture. Big selection of fruits is growing up in India such as apple, banana, guava, grape, mango, pomegranate, orange is the main one. Fruit production gives around 20% of the country’s development. However, because of absence of maintenance, inappropriate development of fruits and manual investigation there has been scale back in generate the standard of fruits.So, Data Mining Approach used in the agriculture domain to resolve several agricultural issues of classification or prediction. During this paper complete survey of several data mining approach for crop disease management has been done. Detection of disease in early state will improve in quality of crop still as decrease the production cost. Also, we can improve the production of the particular crop. Several major parameters are used for the crop disease classification or prediction.
{"title":"A Wide Survey on Data Mining Approach for Crop Diseases Detection and Prevention","authors":"V. N. Nirgude, S. Malik","doi":"10.3233/apc210239","DOIUrl":"https://doi.org/10.3233/apc210239","url":null,"abstract":"India is agriculture land and major revenue manufacturing sector. However, because of amendment in temporal parameters and uncertainty in climate directly have an effect on quality and amount of the assembly and maintenance of crops. Also, quality even a lot of degrade once the crops area unit infected by any malady. The main focus of this analysis in agriculture is to increment the crop quality and potency at lower price and gain profit as result of in India the majority of the population depends on agriculture. Big selection of fruits is growing up in India such as apple, banana, guava, grape, mango, pomegranate, orange is the main one. Fruit production gives around 20% of the country’s development. However, because of absence of maintenance, inappropriate development of fruits and manual investigation there has been scale back in generate the standard of fruits.So, Data Mining Approach used in the agriculture domain to resolve several agricultural issues of classification or prediction. During this paper complete survey of several data mining approach for crop disease management has been done. Detection of disease in early state will improve in quality of crop still as decrease the production cost. Also, we can improve the production of the particular crop. Several major parameters are used for the crop disease classification or prediction.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.
{"title":"Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices","authors":"Ra. Kamalaeswari, V. Ceronmani Sharmila","doi":"10.3233/apc210259","DOIUrl":"https://doi.org/10.3233/apc210259","url":null,"abstract":"The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string
{"title":"Identification of Fake Video Using Smart Contracts and SHA Algorithm","authors":"SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav","doi":"10.3233/apc210227","DOIUrl":"https://doi.org/10.3233/apc210227","url":null,"abstract":"Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.
{"title":"Wireless Underground Sensor Network for Monitoring Various Fields Using Magnetic Induction","authors":"P. Manigandan, C. Balaji, M. Ramanan, S. Ragul","doi":"10.3233/apc210297","DOIUrl":"https://doi.org/10.3233/apc210297","url":null,"abstract":"The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many neuroimaging processing functions believe the preprocessing and skull strip (SS) to be an important step in brain tumor diagnosis. For complex physical reasons intensity changes in brain structure and magnetic resonance imaging of the brain, a proper preprocessing and SS is an important part. The method of removing the skull is relayed to the taking away of the skull area in the brain for medical investigation. It is more correct and necessary techniques for distinguishing between brain regions and cranial regions and this is believed a demanding task. This paper gives detailed review on the preprocessing and traditional transition to machine learning and deep learning-based automatic SS techniques of magnetic resonance imaging.
{"title":"Preprocessing and Skull Stripping of Brain Tumor Extraction from Magnetic Resonance Imaging Images Using Image Processing","authors":"Shweta B. Suryawanshi, S. B. Patil","doi":"10.3233/apc210208","DOIUrl":"https://doi.org/10.3233/apc210208","url":null,"abstract":"Many neuroimaging processing functions believe the preprocessing and skull strip (SS) to be an important step in brain tumor diagnosis. For complex physical reasons intensity changes in brain structure and magnetic resonance imaging of the brain, a proper preprocessing and SS is an important part. The method of removing the skull is relayed to the taking away of the skull area in the brain for medical investigation. It is more correct and necessary techniques for distinguishing between brain regions and cranial regions and this is believed a demanding task. This paper gives detailed review on the preprocessing and traditional transition to machine learning and deep learning-based automatic SS techniques of magnetic resonance imaging.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image processing techniques are essential part of the current computer technologies and that it plays vital role in various applications like medical field, object detection, video surveillance system, computer vision etc. The important process of Image processing is Image Segmentation. Image Segmentation is the process of splitting the images into various tiny parts called segments. Image processing makes to simplify the image representation in order to analyze the images. So many algorithms are developed for segmenting images, based on the certain feature of the pixel. In this paper different algorithms of segmentation can be reviewed, analyzed and finally list out the comparison for all the algorithms. This comparison study is useful for increasing accuracy and performance of segmentation methods in various image processing domains.
{"title":"A Study on Image Segmentation Method for Image Processing","authors":"S. Prabu, J. Gnanasekar","doi":"10.3233/apc210223","DOIUrl":"https://doi.org/10.3233/apc210223","url":null,"abstract":"Image processing techniques are essential part of the current computer technologies and that it plays vital role in various applications like medical field, object detection, video surveillance system, computer vision etc. The important process of Image processing is Image Segmentation. Image Segmentation is the process of splitting the images into various tiny parts called segments. Image processing makes to simplify the image representation in order to analyze the images. So many algorithms are developed for segmenting images, based on the certain feature of the pixel. In this paper different algorithms of segmentation can be reviewed, analyzed and finally list out the comparison for all the algorithms. This comparison study is useful for increasing accuracy and performance of segmentation methods in various image processing domains.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy
To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.
{"title":"#Vaccine: Using Hashtags from Indian Tweets to Capture and Analyse the Sentiments of People on Vaccination for Covid’19 Pandemic","authors":"K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy","doi":"10.3233/apc210183","DOIUrl":"https://doi.org/10.3233/apc210183","url":null,"abstract":"To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}