首页 > 最新文献

Recent Trends in Intensive Computing最新文献

英文 中文
Restoring and Enhancing Degraded Underwater Pipelines for Identifying and Detecting Corrosion 修复与加固水下退化管道的腐蚀识别与检测
Pub Date : 2021-12-01 DOI: 10.3233/apc210249
Vaibhav A. Parjane, Mohit Gangwar
Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.
水下图像腐蚀检测是消除油气管道内部泄漏和危害的必要手段。这些测试利用了各种情况下的各种水下图片。基于腐蚀管道颜色估计海底管道腐蚀的现代技术。对于损坏的水下视频,首先提出了一种图像重建和增强算法。所创建的算法减少了模糊,提高了图像的颜色和对比度。在成像细节中改进的颜色有助于腐蚀估计方法。本文提出了一种基于图像处理技术的水下腐蚀检测方法。一些机器学习和深度学习技术已被用于腐蚀分类。在实验分析中,对腐蚀检测的各种特征进行了评价,并提出了比传统方法更好的分类精度。
{"title":"Restoring and Enhancing Degraded Underwater Pipelines for Identifying and Detecting Corrosion","authors":"Vaibhav A. Parjane, Mohit Gangwar","doi":"10.3233/apc210249","DOIUrl":"https://doi.org/10.3233/apc210249","url":null,"abstract":"Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real Time Tracing and Alerting System for Vehicles and Children to Ensure Safety and Security Using Labview 基于Labview的车辆与儿童安全实时跟踪报警系统
Pub Date : 2021-12-01 DOI: 10.3233/apc210177
Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya
The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.
车辆和儿童的绝对时间监测、探测和警报系统需要定期跟踪和传输收集到的信息,以确保儿童的安全。实时检测和预警系统的说明由两个单元组成:跟踪单元,跟踪位置信息,传输到监控区域,将数据记录在数据库中,并利用这些数据与谷歌/其他地图一起定位车辆的准确位置。第二个单元是警报单元,它使用主动射频识别设备(RFID)跟踪学生,该设备将放置在学生身份证上。无线电波收发器发送普通无线电波,由身份证内的RFID接收。射频识别线圈对无线电波进行修改,并将其重新发送到接收器。射频识别标签也用于考勤,直接更新到数据库并显示其他学生信息。
{"title":"Real Time Tracing and Alerting System for Vehicles and Children to Ensure Safety and Security Using Labview","authors":"Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya","doi":"10.3233/apc210177","DOIUrl":"https://doi.org/10.3233/apc210177","url":null,"abstract":"The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of Computer Assisted Instruction in Higher Educational Organization 计算机辅助教学在高等教育机构中的部署
Pub Date : 2021-12-01 DOI: 10.3233/apc210229
N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan
The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology
目前的研究着眼于电脑如何帮助不同阅读能力的学生。关于计算机对教育成就和态度水平的影响的研究已经进行了。在本研究中,我们先探讨了Bloom分类法对传统系统的影响,然后重点探讨了CAI在高等教育中的整合。这项研究正在扩展到包括在教育系统中使用计算机。本文旨在概述和阐述计算机如何帮助生活的各个部门,包括教育。在教育或培训的背景下提供的信息更有价值。教学要做好反思,被称为“超前”教学。这篇研究论文关注的是教育院系、设施和教育过程的组织结构。本研究旨在关注CAI以提高印度高等教育的质量。我们还讨论了可以实现该技术的领域
{"title":"Deployment of Computer Assisted Instruction in Higher Educational Organization","authors":"N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan","doi":"10.3233/apc210229","DOIUrl":"https://doi.org/10.3233/apc210229","url":null,"abstract":"The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wide Survey on Data Mining Approach for Crop Diseases Detection and Prevention 作物病害检测与预防的数据挖掘方法综述
Pub Date : 2021-12-01 DOI: 10.3233/apc210239
V. N. Nirgude, S. Malik
India is agriculture land and major revenue manufacturing sector. However, because of amendment in temporal parameters and uncertainty in climate directly have an effect on quality and amount of the assembly and maintenance of crops. Also, quality even a lot of degrade once the crops area unit infected by any malady. The main focus of this analysis in agriculture is to increment the crop quality and potency at lower price and gain profit as result of in India the majority of the population depends on agriculture. Big selection of fruits is growing up in India such as apple, banana, guava, grape, mango, pomegranate, orange is the main one. Fruit production gives around 20% of the country’s development. However, because of absence of maintenance, inappropriate development of fruits and manual investigation there has been scale back in generate the standard of fruits.So, Data Mining Approach used in the agriculture domain to resolve several agricultural issues of classification or prediction. During this paper complete survey of several data mining approach for crop disease management has been done. Detection of disease in early state will improve in quality of crop still as decrease the production cost. Also, we can improve the production of the particular crop. Several major parameters are used for the crop disease classification or prediction.
印度是农业用地和制造业的主要收入部门。然而,由于时间参数的变化和气候的不确定性直接影响作物的种植和维持质量和数量。另外,作物一旦受到任何病害的感染,其质量甚至会大大降低。这一分析在农业方面的主要重点是在较低的价格下提高作物的质量和效力,并获得利润,因为在印度,大多数人口依赖农业。大量的水果选择正在印度成长,如苹果,香蕉,番石榴,葡萄,芒果,石榴,橙子是主要的。水果生产约占该国经济发展的20%。然而,由于缺乏维护,水果开发不当和人工调查,导致水果生产标准下降。因此,数据挖掘方法应用于农业领域,解决了农业分类或预测的若干问题。本文对作物病害管理的几种数据挖掘方法进行了较为全面的综述。早期发现病害不仅能提高作物品质,还能降低生产成本。此外,我们还可以提高特定作物的产量。几种主要参数用于作物病害分类或预测。
{"title":"A Wide Survey on Data Mining Approach for Crop Diseases Detection and Prevention","authors":"V. N. Nirgude, S. Malik","doi":"10.3233/apc210239","DOIUrl":"https://doi.org/10.3233/apc210239","url":null,"abstract":"India is agriculture land and major revenue manufacturing sector. However, because of amendment in temporal parameters and uncertainty in climate directly have an effect on quality and amount of the assembly and maintenance of crops. Also, quality even a lot of degrade once the crops area unit infected by any malady. The main focus of this analysis in agriculture is to increment the crop quality and potency at lower price and gain profit as result of in India the majority of the population depends on agriculture. Big selection of fruits is growing up in India such as apple, banana, guava, grape, mango, pomegranate, orange is the main one. Fruit production gives around 20% of the country’s development. However, because of absence of maintenance, inappropriate development of fruits and manual investigation there has been scale back in generate the standard of fruits.So, Data Mining Approach used in the agriculture domain to resolve several agricultural issues of classification or prediction. During this paper complete survey of several data mining approach for crop disease management has been done. Detection of disease in early state will improve in quality of crop still as decrease the production cost. Also, we can improve the production of the particular crop. Several major parameters are used for the crop disease classification or prediction.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices 使用EMR、EHR和健康监测设备安全医疗保健数据的威胁模型
Pub Date : 2021-12-01 DOI: 10.3233/apc210259
Ra. Kamalaeswari, V. Ceronmani Sharmila
The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.
该项目的主要目的是提出一个威胁建模框架,以促进医疗保健服务的安全性。威胁模型用于分析导致电子健康监测设备易受网络攻击的网络威胁。该模型还有助于加强基于软件的web应用程序(如医疗保健组织中使用的EMR和EHR)的安全性。以软件、web应用和监控设备为攻击面,识别信息资产,消除威胁代理。此威胁模型的主要目标是分析和建立OpenEMR中提供安全数据传输的信任边界。我们使用了一个STRIDE威胁模型和一个基于DFD的方法,使用了OWASP威胁建模工具。SIEM工具提供了一个连续的安全方法来记录过程和结果。
{"title":"Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices","authors":"Ra. Kamalaeswari, V. Ceronmani Sharmila","doi":"10.3233/apc210259","DOIUrl":"https://doi.org/10.3233/apc210259","url":null,"abstract":"The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Fake Video Using Smart Contracts and SHA Algorithm 基于智能合约和SHA算法的假视频识别
Pub Date : 2021-12-01 DOI: 10.3233/apc210227
SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav
Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string
Deepfake实际上是一种媒介,一个人被另一个看起来像他的人所取代。深刻的虚假示威已经持续了相当长一段时间。深刻的虚假使用令人难以置信的策略,例如,人工智能和人造意识来创造和控制具有高潜力的视觉和声音物质。深刻的误传依赖于所谓的公正的联系和编程编码器。这些对于编码器来说是必不可少的,编码器将图像减小到较低维度的理想图像和理想的介绍图像。我通过twitter和facebook等基于网络的媒体平台研究了关于各种进展的各种答案。从这些考察中,我们被唤醒去扩展这一目标。在我们提出的框架中,我们围绕着利用区块链、敏锐协议和安全哈希计算来识别深刻的虚假录音。我们利用一些计算来解决这个问题,例如SHA字符串
{"title":"Identification of Fake Video Using Smart Contracts and SHA Algorithm","authors":"SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav","doi":"10.3233/apc210227","DOIUrl":"https://doi.org/10.3233/apc210227","url":null,"abstract":"Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Underground Sensor Network for Monitoring Various Fields Using Magnetic Induction 利用磁感应监测各种磁场的无线地下传感器网络
Pub Date : 2021-12-01 DOI: 10.3233/apc210297
P. Manigandan, C. Balaji, M. Ramanan, S. Ragul
The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.
矿山安全事故频发,造成了严重的经济损失和巨大的经济损失。全球矿业部门迫切需要提高矿山的运营效率和整体安全性。本文提出了一种基于WUSN的矿山安全监测方法。监测系统采集矿井周围的温度、湿度、土壤振动和瓦斯值,然后通过无线井下传感器网络传输数据。这里提出了基于磁感应传输的方法,在这种方法中,土壤是通信的介质,因此根据土壤电导率传输被测量的信息。这也是一个早期预警系统,它将帮助所有矿工在受害者发生之前挽救他们的生命。
{"title":"Wireless Underground Sensor Network for Monitoring Various Fields Using Magnetic Induction","authors":"P. Manigandan, C. Balaji, M. Ramanan, S. Ragul","doi":"10.3233/apc210297","DOIUrl":"https://doi.org/10.3233/apc210297","url":null,"abstract":"The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preprocessing and Skull Stripping of Brain Tumor Extraction from Magnetic Resonance Imaging Images Using Image Processing 基于图像处理的磁共振成像图像中脑肿瘤提取的预处理与颅骨剥离
Pub Date : 2021-12-01 DOI: 10.3233/apc210208
Shweta B. Suryawanshi, S. B. Patil
Many neuroimaging processing functions believe the preprocessing and skull strip (SS) to be an important step in brain tumor diagnosis. For complex physical reasons intensity changes in brain structure and magnetic resonance imaging of the brain, a proper preprocessing and SS is an important part. The method of removing the skull is relayed to the taking away of the skull area in the brain for medical investigation. It is more correct and necessary techniques for distinguishing between brain regions and cranial regions and this is believed a demanding task. This paper gives detailed review on the preprocessing and traditional transition to machine learning and deep learning-based automatic SS techniques of magnetic resonance imaging.
许多神经影像处理功能认为预处理和颅骨条带(SS)是脑肿瘤诊断的重要步骤。由于复杂的物理原因,脑结构强度变化和脑磁共振成像,适当的预处理和SS是重要的一环。移除颅骨的方法被转译为在大脑中取出颅骨区域进行医学调查。区分脑区和颅区是一项更为正确和必要的技术,这被认为是一项艰巨的任务。本文详细介绍了磁共振成像的预处理和传统的向机器学习和基于深度学习的自动SS技术的过渡。
{"title":"Preprocessing and Skull Stripping of Brain Tumor Extraction from Magnetic Resonance Imaging Images Using Image Processing","authors":"Shweta B. Suryawanshi, S. B. Patil","doi":"10.3233/apc210208","DOIUrl":"https://doi.org/10.3233/apc210208","url":null,"abstract":"Many neuroimaging processing functions believe the preprocessing and skull strip (SS) to be an important step in brain tumor diagnosis. For complex physical reasons intensity changes in brain structure and magnetic resonance imaging of the brain, a proper preprocessing and SS is an important part. The method of removing the skull is relayed to the taking away of the skull area in the brain for medical investigation. It is more correct and necessary techniques for distinguishing between brain regions and cranial regions and this is believed a demanding task. This paper gives detailed review on the preprocessing and traditional transition to machine learning and deep learning-based automatic SS techniques of magnetic resonance imaging.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Image Segmentation Method for Image Processing 图像处理中的图像分割方法研究
Pub Date : 2021-12-01 DOI: 10.3233/apc210223
S. Prabu, J. Gnanasekar
Image processing techniques are essential part of the current computer technologies and that it plays vital role in various applications like medical field, object detection, video surveillance system, computer vision etc. The important process of Image processing is Image Segmentation. Image Segmentation is the process of splitting the images into various tiny parts called segments. Image processing makes to simplify the image representation in order to analyze the images. So many algorithms are developed for segmenting images, based on the certain feature of the pixel. In this paper different algorithms of segmentation can be reviewed, analyzed and finally list out the comparison for all the algorithms. This comparison study is useful for increasing accuracy and performance of segmentation methods in various image processing domains.
图像处理技术是当前计算机技术的重要组成部分,在医学领域、目标检测、视频监控系统、计算机视觉等领域发挥着至关重要的作用。图像处理的重要过程是图像分割。图像分割是将图像分割成各种称为片段的小部分的过程。图像处理可以简化图像的表示,以便对图像进行分析。基于像素的特定特征,开发了许多图像分割算法。本文对不同的分割算法进行了回顾和分析,最后列出了各种算法的比较。这一比较研究有助于提高不同图像处理领域中分割方法的精度和性能。
{"title":"A Study on Image Segmentation Method for Image Processing","authors":"S. Prabu, J. Gnanasekar","doi":"10.3233/apc210223","DOIUrl":"https://doi.org/10.3233/apc210223","url":null,"abstract":"Image processing techniques are essential part of the current computer technologies and that it plays vital role in various applications like medical field, object detection, video surveillance system, computer vision etc. The important process of Image processing is Image Segmentation. Image Segmentation is the process of splitting the images into various tiny parts called segments. Image processing makes to simplify the image representation in order to analyze the images. So many algorithms are developed for segmenting images, based on the certain feature of the pixel. In this paper different algorithms of segmentation can be reviewed, analyzed and finally list out the comparison for all the algorithms. This comparison study is useful for increasing accuracy and performance of segmentation methods in various image processing domains.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
#Vaccine: Using Hashtags from Indian Tweets to Capture and Analyse the Sentiments of People on Vaccination for Covid’19 Pandemic #疫苗:使用印度推特上的标签来捕捉和分析人们对Covid - 19大流行疫苗接种的情绪
Pub Date : 2021-12-01 DOI: 10.3233/apc210183
K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy
To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.
为了防止公众感染Covid - 19大流行,印度政府已从2021年1月中旬开始接种疫苗。政府已经批准了这两种疫苗,牛津大学的Covishield和巴拉特生物技术公司的Covaxin。疫苗接种从一线工作人员开始,并进一步扩展到普通公众,优先考虑60岁以上的老年人和45岁以上的合并发病率的人。虽然许多人从中受益,但仍有一群人不相信疫苗接种。我们开展这项工作是为了通过推特的标签来分析印度人对疫苗的看法。结果表明,虽然大多数社区对疫苗持积极态度,但仍有一部分人表达了负面情绪。
{"title":"#Vaccine: Using Hashtags from Indian Tweets to Capture and Analyse the Sentiments of People on Vaccination for Covid’19 Pandemic","authors":"K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy","doi":"10.3233/apc210183","DOIUrl":"https://doi.org/10.3233/apc210183","url":null,"abstract":"To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Recent Trends in Intensive Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1