首页 > 最新文献

Recent Trends in Intensive Computing最新文献

英文 中文
VirtualEye: Android Application for the Visually Impaired VirtualEye:专为视障人士设计的Android应用程序
Pub Date : 2021-12-01 DOI: 10.3233/apc210204
Jay Bagrecha, Tanay Shah, Karan Shah, Tanvi Gandhi, Sushila Palwe
In India, almost 18 million visually impaired people have difficulties in managing their day-to-day activities. Hence, there is a need to develop an application that can assist them every time and give vocal instructions in both English and Hindi. In this paper, we introduced a robust lightweight Android application that facilitates visually impaired individuals by providing a variety of essential features such as object and distance detection, Indian currency note detection, and optical character recognition that can enhance their quality of life. This application aims to have a user-friendly GUI well suited to the needs of the blind user and modules like Object Recognition with Image Captioning so that the visually challenged user can gain a better understanding of their surroundings.
在印度,近1800万视障人士在管理日常活动方面存在困难。因此,有必要开发一种应用程序,可以每次都帮助他们,并用英语和印地语提供语音指导。在本文中,我们介绍了一个强大的轻量级Android应用程序,通过提供各种基本功能,如物体和距离检测,印度纸币检测和光学字符识别,可以提高视障人士的生活质量,从而为视障人士提供便利。这个应用程序的目的是有一个用户友好的GUI,非常适合盲人用户和模块的需求,如带有图像字幕的对象识别,这样视觉障碍的用户可以更好地了解他们的周围环境。
{"title":"VirtualEye: Android Application for the Visually Impaired","authors":"Jay Bagrecha, Tanay Shah, Karan Shah, Tanvi Gandhi, Sushila Palwe","doi":"10.3233/apc210204","DOIUrl":"https://doi.org/10.3233/apc210204","url":null,"abstract":"In India, almost 18 million visually impaired people have difficulties in managing their day-to-day activities. Hence, there is a need to develop an application that can assist them every time and give vocal instructions in both English and Hindi. In this paper, we introduced a robust lightweight Android application that facilitates visually impaired individuals by providing a variety of essential features such as object and distance detection, Indian currency note detection, and optical character recognition that can enhance their quality of life. This application aims to have a user-friendly GUI well suited to the needs of the blind user and modules like Object Recognition with Image Captioning so that the visually challenged user can gain a better understanding of their surroundings.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134108808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assertion Driven Modified Booth Encoding and Post Computation Model for Speed MAC Applications 高速MAC应用的断言驱动改进摊位编码和后期计算模型
Pub Date : 2021-12-01 DOI: 10.3233/apc210289
Sivasaravanababu, T. R. Dineshkumar, Dr. G. Saravana Kumar
The Multiply-Accumulate Unit (MAC) is the core computational block in many DSP and wireless application but comes with more complicated architectures. Moreover the MAC block also decides the energy consumption and the performance of the overall design; due to its lies in the maximal path delay critical propagation. Developing high performance and energy optimized MAC core is essential to optimized DSP core. In this work, a high speed and low power signed booth radix enabled MAC Unit is proposed with highly configurable assertion driven modified booth algorithm (AD-MBE). The proposed booth core is based on core optimized booth radix-4 with hierarchical partial product accumulation design and associated path delay optimization and computational complexity reduction. Here all booth generated partial products are added as post summation adder network which consists of carry select adder (CSA) & carry look ahead (CLA) sequentially which narrow down the energy and computational complexity. Here increasing the operating frequency is achieved by accumulating encoding bits of each of the input operand into assertion unit before generating end results instead of going through the entire partial product accumulation. The FPGA implementation of the proposed signed asserted booth radix-4 based MAC shows significant complexity reduction with improved system performance as compared to the conventional booth unit and conventional array multiplier.
乘法累加单元(MAC)是许多DSP和无线应用的核心计算块,但具有更复杂的架构。此外,MAC块还决定了整体设计的能耗和性能;由于其存在于最大路径上延迟临界传播。开发高性能、节能的MAC核是优化DSP核的必要条件。在这项工作中,提出了一种高速低功耗的签名展位基数支持MAC单元,该单元采用高度可配置的断言驱动改进展位算法(AD-MBE)。提出的展位核心是基于核心优化展位基数-4,采用分层部分产品累积设计和相关的路径延迟优化和计算复杂度降低。在这里,所有生成的部分产品都被添加到由进位选择加法器(CSA)和进位预判加法器(CLA)组成的后求和加法器网络中,从而缩小了能量和计算复杂度。在这里,增加操作频率是通过在生成最终结果之前将每个输入操作数的编码位累加到断言单元中来实现的,而不是通过整个部分乘积累加。与传统的展台单元和传统的阵列乘法器相比,所提出的基于签名断言展台基数4的MAC的FPGA实现显示出显著的复杂性降低和系统性能的改善。
{"title":"Assertion Driven Modified Booth Encoding and Post Computation Model for Speed MAC Applications","authors":"Sivasaravanababu, T. R. Dineshkumar, Dr. G. Saravana Kumar","doi":"10.3233/apc210289","DOIUrl":"https://doi.org/10.3233/apc210289","url":null,"abstract":"The Multiply-Accumulate Unit (MAC) is the core computational block in many DSP and wireless application but comes with more complicated architectures. Moreover the MAC block also decides the energy consumption and the performance of the overall design; due to its lies in the maximal path delay critical propagation. Developing high performance and energy optimized MAC core is essential to optimized DSP core. In this work, a high speed and low power signed booth radix enabled MAC Unit is proposed with highly configurable assertion driven modified booth algorithm (AD-MBE). The proposed booth core is based on core optimized booth radix-4 with hierarchical partial product accumulation design and associated path delay optimization and computational complexity reduction. Here all booth generated partial products are added as post summation adder network which consists of carry select adder (CSA) & carry look ahead (CLA) sequentially which narrow down the energy and computational complexity. Here increasing the operating frequency is achieved by accumulating encoding bits of each of the input operand into assertion unit before generating end results instead of going through the entire partial product accumulation. The FPGA implementation of the proposed signed asserted booth radix-4 based MAC shows significant complexity reduction with improved system performance as compared to the conventional booth unit and conventional array multiplier.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133937333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solar-Powered Improved Full Bridge Resonant Inverter for High-Frequency Industrial Applications 用于高频工业应用的太阳能改进全桥谐振逆变器
Pub Date : 2021-12-01 DOI: 10.3233/apc210296
Upasana Sapra, Aiswarya Sakthivel, X. Shobana Macdalin, S. Siva Ranjini
Electrical energy consumption is alarmingly rising, but the availability of conventional sources is limited. To meet the increasing demand; the implementation of non-conventional sources is the need of the hour. Solar energy is the most sustainable alternative for power generation among non-conventional sources families. Resonant inverters are used in low-power high-frequency induction heating appliances. Full-bridge resonant inverters are most commonly used to convert solar received power into the suitable form required for high-frequency application device by providing maximum power to the load at resonant frequency The aim of the paper is to analyze the working of the resonant inverter by taking the input supply from the solar panel and converting the obtained dc input to ac input through the resonant inverter. This obtained output is supplied for the high-frequency industrial application which mainly includes Induction frequency heating Applications. Induction heating is one of the techniques used in casting foundry for the treatment of metals. It involves the heat treatment of the metals namely annealing, hardening tempering method. goes here.
电能消耗正在惊人地增长,但传统能源的可用性有限。满足日益增长的需求;实施非常规能源是当务之急。在非传统能源家庭中,太阳能是最具可持续性的替代能源。谐振逆变器用于低功率高频感应加热器具。全桥谐振式逆变器是最常用的一种将太阳能接收的功率转换为高频应用设备所需的合适形式,在谐振频率上向负载提供最大功率。本文的目的是通过谐振式逆变器从太阳能板上取输入电源,将得到的直流输入转换为交流输入,分析谐振式逆变器的工作原理。所获得的输出用于高频工业应用,主要包括感应频率加热应用。感应加热是铸造工艺中用于金属热处理的技术之一。它涉及到金属的热处理即退火、淬火回火的方法。就在这里。
{"title":"Solar-Powered Improved Full Bridge Resonant Inverter for High-Frequency Industrial Applications","authors":"Upasana Sapra, Aiswarya Sakthivel, X. Shobana Macdalin, S. Siva Ranjini","doi":"10.3233/apc210296","DOIUrl":"https://doi.org/10.3233/apc210296","url":null,"abstract":"Electrical energy consumption is alarmingly rising, but the availability of conventional sources is limited. To meet the increasing demand; the implementation of non-conventional sources is the need of the hour. Solar energy is the most sustainable alternative for power generation among non-conventional sources families. Resonant inverters are used in low-power high-frequency induction heating appliances. Full-bridge resonant inverters are most commonly used to convert solar received power into the suitable form required for high-frequency application device by providing maximum power to the load at resonant frequency The aim of the paper is to analyze the working of the resonant inverter by taking the input supply from the solar panel and converting the obtained dc input to ac input through the resonant inverter. This obtained output is supplied for the high-frequency industrial application which mainly includes Induction frequency heating Applications. Induction heating is one of the techniques used in casting foundry for the treatment of metals. It involves the heat treatment of the metals namely annealing, hardening tempering method. goes here.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Security Alerts for the Safety of Industrial Area 基于物联网的工业区域安全警报
Pub Date : 2021-12-01 DOI: 10.3233/apc210185
K. Kharade, S. Kharade, V. R. Sonawane, S. Bhamre, S. V. Katkar, R. K. Kamat
The security of any business plays a vital role. All enterprises expect high security because of the increase in robbery. It is challenging to manage security with traditional ways of protection. This paper emphasizes the sensor-based security system to protect against any unwanted entry in the business area. This system is developed using IoT-based sensors, and electronic materials develop the security system. The present scenario ensures protection and security have become inevitably necessary. There is regressive progress in the protection sector as the influence of new technology is hitting its height. It’s well-known as a modern home when there is a current home with minimal human effort. This technology aims to automate industrial area security and partially replace the security individual, enabling us to monitor unsuspecting activities and be warned during critical situations. Since wireless and emerging technology is taking place, an automated intelligent protection system is being introduced.
任何企业的安全都起着至关重要的作用。由于抢劫事件的增加,所有企业都希望提高安全性。用传统的保护方式来管理安全是具有挑战性的。本文重点介绍了基于传感器的安全系统,以防止任何不速之客进入商业区域。该系统是利用物联网传感器开发的,电子材料开发了安全系统。目前的情况确保保护和安全已不可避免地成为必要。随着新技术的影响达到顶峰,保护部门出现了倒退的进展。它被称为一个现代的家,当有一个目前的家,用最少的人力。这项技术旨在实现工业区域安全的自动化,部分取代安全人员,使我们能够监控毫无戒心的活动,并在危急情况下得到警告。由于无线和新兴技术的发展,自动智能保护系统正在引入。
{"title":"IoT Based Security Alerts for the Safety of Industrial Area","authors":"K. Kharade, S. Kharade, V. R. Sonawane, S. Bhamre, S. V. Katkar, R. K. Kamat","doi":"10.3233/apc210185","DOIUrl":"https://doi.org/10.3233/apc210185","url":null,"abstract":"The security of any business plays a vital role. All enterprises expect high security because of the increase in robbery. It is challenging to manage security with traditional ways of protection. This paper emphasizes the sensor-based security system to protect against any unwanted entry in the business area. This system is developed using IoT-based sensors, and electronic materials develop the security system. The present scenario ensures protection and security have become inevitably necessary. There is regressive progress in the protection sector as the influence of new technology is hitting its height. It’s well-known as a modern home when there is a current home with minimal human effort. This technology aims to automate industrial area security and partially replace the security individual, enabling us to monitor unsuspecting activities and be warned during critical situations. Since wireless and emerging technology is taking place, an automated intelligent protection system is being introduced.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Security and Privacy-Preserving Framework Using Machine Learning and Blockchain in Big-Data to Data Middle Platform in the Era of IR 4.0 基于机器学习和区块链的大数据到数据中间平台的数据安全与隐私保护框架
Pub Date : 2021-12-01 DOI: 10.3233/apc210190
Chuqiao Chen, S. B. Goyal
The modem data is collected by using IoT, stored in distributed cloud storage, and issued for data mining or training artificial intelligence. These new digital technologies integrate into the data middle platform have facilitated the progress of industry, promoted the fourth industrial revolution. And it also has caused challenges in security and privacy-preventing. The privacy data breach can happen in any phase of the Big-Data life cycle, and the Data Middle Platform also faces similar situations. How to make the privacy avoid leakage is exigency. The traditional privacy-preventing model is not enough, we need the help of Machine-Learning and the Blockchain. In this research, the researcher reviews the security and privacy-preventing in Big-Data, Machine Learning, Blockchain, and other related works at first. And then finding some gaps between the theory and the actual work. Based on these gaps, trying to create a suitable framework to guide the industry to protect their privacy when the organization contribute and operate their data middle platform. No only academicians, but also industry practitioners especially SMEs will get the benefit from this research.
利用物联网收集调制解调器数据,存储在分布式云存储中,发布用于数据挖掘或训练人工智能。这些新的数字技术融合到数据中间平台中,促进了工业的进步,推动了第四次工业革命。同时也带来了安全和隐私保护方面的挑战。隐私数据泄露可能发生在大数据生命周期的任何阶段,数据中间平台也面临着类似的情况。如何使隐私避免泄漏是刻不容缓的。传统的隐私保护模式是不够的,我们需要机器学习和区块链的帮助。在本研究中,研究者首先回顾了大数据、机器学习、区块链等相关工作中的安全与隐私防范。然后找到理论和实际工作之间的差距。基于这些差距,尝试创建一个合适的框架来指导行业在组织贡献和运营其数据中间平台时保护其隐私。不仅是学者,而且行业从业者特别是中小企业也将从这项研究中受益。
{"title":"Data Security and Privacy-Preserving Framework Using Machine Learning and Blockchain in Big-Data to Data Middle Platform in the Era of IR 4.0","authors":"Chuqiao Chen, S. B. Goyal","doi":"10.3233/apc210190","DOIUrl":"https://doi.org/10.3233/apc210190","url":null,"abstract":"The modem data is collected by using IoT, stored in distributed cloud storage, and issued for data mining or training artificial intelligence. These new digital technologies integrate into the data middle platform have facilitated the progress of industry, promoted the fourth industrial revolution. And it also has caused challenges in security and privacy-preventing. The privacy data breach can happen in any phase of the Big-Data life cycle, and the Data Middle Platform also faces similar situations. How to make the privacy avoid leakage is exigency. The traditional privacy-preventing model is not enough, we need the help of Machine-Learning and the Blockchain. In this research, the researcher reviews the security and privacy-preventing in Big-Data, Machine Learning, Blockchain, and other related works at first. And then finding some gaps between the theory and the actual work. Based on these gaps, trying to create a suitable framework to guide the industry to protect their privacy when the organization contribute and operate their data middle platform. No only academicians, but also industry practitioners especially SMEs will get the benefit from this research.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124828983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Deep Analysis of Higher Education Cognitive and Psychological Learning Impact During Covid 19 Pandemic Covid - 19大流行期间高等教育认知和心理学习影响的深度分析
Pub Date : 2021-12-01 DOI: 10.3233/apc210254
Kavitha Srinivas, Saravanan Pitchai, Udayabhanu N P G Raju, Abhishek Kumar, B. Muthu Kumaran, K. Vengatesan
Current scenario around the globe we can find that physical or face to face learning got a very big full stop for a long period of time. Virtual learning took its place, somewhat leaving behind both its positive and negative impact on the education sector. E-learning is playing a chief part in maintaining the decorum of education sector. The research and surveys found that young learners got many benefits through this type of education but also it is undeniable that it has negative aspects too, which needs to be solved. Mainly private higher education suffered less as compared to institutions in rural areas. This research proposes how to bring out the quality of output through e-learning for all the learners equally. It has become a challenge for private and government institutions to make this smart or virtual learning as the best integral part of educational system.
目前在全球范围内,我们可以发现,在很长一段时间里,身体或面对面的学习已经停止了。虚拟学习取而代之,在某种程度上,它对教育部门的积极和消极影响都被抛在了后面。电子学习在维护教育部门的礼仪方面发挥着重要作用。研究和调查发现,通过这种类型的教育,年轻的学习者得到了很多好处,但不可否认的是,它也有负面的方面,这需要解决。与农村地区的机构相比,私立高等教育受到的影响较小。本研究提出了如何平等地为所有学习者提高电子学习的输出质量。如何使这种智能或虚拟学习成为教育系统的最佳组成部分,已成为私人和政府机构面临的挑战。
{"title":"A Deep Analysis of Higher Education Cognitive and Psychological Learning Impact During Covid 19 Pandemic","authors":"Kavitha Srinivas, Saravanan Pitchai, Udayabhanu N P G Raju, Abhishek Kumar, B. Muthu Kumaran, K. Vengatesan","doi":"10.3233/apc210254","DOIUrl":"https://doi.org/10.3233/apc210254","url":null,"abstract":"Current scenario around the globe we can find that physical or face to face learning got a very big full stop for a long period of time. Virtual learning took its place, somewhat leaving behind both its positive and negative impact on the education sector. E-learning is playing a chief part in maintaining the decorum of education sector. The research and surveys found that young learners got many benefits through this type of education but also it is undeniable that it has negative aspects too, which needs to be solved. Mainly private higher education suffered less as compared to institutions in rural areas. This research proposes how to bring out the quality of output through e-learning for all the learners equally. It has become a challenge for private and government institutions to make this smart or virtual learning as the best integral part of educational system.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspect Based Emotion Detection and Topic Modeling on Social Media Reviews 基于方面的社交媒体评论情感检测与话题建模
Pub Date : 2021-12-01 DOI: 10.3233/apc210242
Ganesh N. Jorvekar, Mohit Gangwar
In recent years, the number of user comments and text materials has increased dramatically. Analysis of the emotions has drawn interest from researchers. Earlier research in the field of artificial-intelligence concentrate on identification of emotion and exploring the explanation the emotions can’t recognized or misrecognized. The association between the emotions leads to the understanding of emotion loss. In this Work we are trying to fill the gap between emotional recognition and emotional co-relation mining through social media reviews of natural language text. The association between emotions, represented as the emotional uncertainty and evolution, is mainly triggered by cognitive bias in the human emotion. Numerous types of features and Recurrent neural-network (RNN) as deep learning model provided to mine the emotion co-relation from emotion detection using text. The rule on conflict of emotions is derived on a symmetric basis. TF-IDF, NLP Features and Co-relation features has used for feature extraction as well as section and Recurrent Neural Network (RNN) and Hybrid deep learning algorithm for classification has used to demonstrates the entire research experiments. Finally evaluate the system performance with various existing system and show the effectiveness of proposed system.
近年来,用户评论和文字材料的数量急剧增加。对情绪的分析引起了研究人员的兴趣。人工智能领域的早期研究主要集中在对情绪的识别和对无法识别或错误识别的情绪的解释。情绪之间的联系导致了对情绪丧失的理解。在这项工作中,我们试图通过对自然语言文本的社交媒体评论来填补情感识别和情感关联挖掘之间的空白。情绪之间的关联主要是由人类情绪的认知偏差引发的,表现为情绪的不确定性和进化。多种类型的特征和递归神经网络(RNN)作为深度学习模型,提供了从文本情感检测中挖掘情感关联的方法。关于情绪冲突的规则是在对称的基础上推导出来的。使用TF-IDF、NLP feature和Co-relation feature进行特征提取,并使用section和Recurrent Neural Network (RNN)和Hybrid deep learning算法进行分类,演示了整个研究实验。最后用现有的各种系统对系统的性能进行了评价,证明了所提系统的有效性。
{"title":"Aspect Based Emotion Detection and Topic Modeling on Social Media Reviews","authors":"Ganesh N. Jorvekar, Mohit Gangwar","doi":"10.3233/apc210242","DOIUrl":"https://doi.org/10.3233/apc210242","url":null,"abstract":"In recent years, the number of user comments and text materials has increased dramatically. Analysis of the emotions has drawn interest from researchers. Earlier research in the field of artificial-intelligence concentrate on identification of emotion and exploring the explanation the emotions can’t recognized or misrecognized. The association between the emotions leads to the understanding of emotion loss. In this Work we are trying to fill the gap between emotional recognition and emotional co-relation mining through social media reviews of natural language text. The association between emotions, represented as the emotional uncertainty and evolution, is mainly triggered by cognitive bias in the human emotion. Numerous types of features and Recurrent neural-network (RNN) as deep learning model provided to mine the emotion co-relation from emotion detection using text. The rule on conflict of emotions is derived on a symmetric basis. TF-IDF, NLP Features and Co-relation features has used for feature extraction as well as section and Recurrent Neural Network (RNN) and Hybrid deep learning algorithm for classification has used to demonstrates the entire research experiments. Finally evaluate the system performance with various existing system and show the effectiveness of proposed system.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129243705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Relative Investigation of Various Algorithms for Online Financial Fraud Detection Techniques 网络金融欺诈检测技术中各种算法的相关研究
Pub Date : 2021-12-01 DOI: 10.3233/apc210174
C. Pallavi, Girija R, Vedhapriyavadhana R, Barnali Dey, R. Vincent
Online financial transactions play a crucial role in today’s economy. It becomes an unavoidable part of the business and global activities. Transaction fraud executes thoughtful intimidations to e-commerce spending. Now-a-days, the online contract or business is fetching additional sound by knowing the types of online transaction frauds associated with, these are raising which disturbs the currency accompanying business. It has the capability to confine and encumber the contract accomplished by the intruder from an honest consumer’s credit card information. In order to avoid such a problem, the proposed system is established transaction limit for the customers. Efficient data is only considered for detecting fraudulent user action and it happens only at the time of registration. Transaction which is happening for any individual is not at all known to any FDS (Fraud Detection System) consecutively at the bank which mainly issues credit cards to customers. To speak out this problem, BLA (Behaviour and Location Analysis) is executed. The FDS tracks at a credit card provided by bank. All the inbound business is directed to the FDS aimed at confirmation, authentication and verification. FDS catches the card particulars and matter to confirm that the operation is fake or genuine. The pick-up merchandises are unknown to Fraud Detection System. If the transaction is assumed to be fraud, then the corresponding bank declines it. In order to verify the individuality, uniqueness or originality, it uses spending patterns and geographical area. In case, if any suspicious pattern is identified or detected, the FDS system needs verification. The information which is already registered by the user, the system identifies infrequent outlines in the disbursement method. After three invalid attempts, the system will hinder the user. In this proposed system, most of the algorithms are checked and investigated for online financial fraud detection techniques.
在线金融交易在当今经济中发挥着至关重要的作用。它成为商业和全球活动中不可避免的一部分。交易欺诈对电子商务消费进行了深思熟虑的恐吓。如今,通过了解与之相关的在线交易欺诈的类型,在线合同或业务正在获得额外的声音,这些正在增加,扰乱了货币伴随业务。它有能力限制和妨碍入侵者从诚实消费者的信用卡信息中完成合同。为了避免这一问题,本系统为客户设置了交易限额。有效数据仅用于检测欺诈性用户操作,并且仅在注册时发生。在主要向客户发行信用卡的银行中,发生在任何个人身上的交易根本不会被任何连续的FDS(欺诈检测系统)所知道。为了指出这个问题,我们执行了行为和位置分析(BLA)。FDS追踪银行提供的信用卡。所有入站业务都指向FDS,目的是确认、认证和验证。FDS捕获卡的细节和事项,以确认操作是假的还是真的。收件商品是欺诈侦测系统所不知道的。如果交易被认为是欺诈,那么相应的银行就会拒绝它。为了验证个性、独特性或原创性,它使用消费模式和地理区域。如果发现或检测到任何可疑模式,则需要对FDS系统进行验证。对于用户已经注册的信息,系统识别支付方法中不常见的轮廓。三次无效尝试后,系统将阻止用户登录。在该系统中,对大多数在线金融欺诈检测技术的算法进行了检查和研究。
{"title":"A Relative Investigation of Various Algorithms for Online Financial Fraud Detection Techniques","authors":"C. Pallavi, Girija R, Vedhapriyavadhana R, Barnali Dey, R. Vincent","doi":"10.3233/apc210174","DOIUrl":"https://doi.org/10.3233/apc210174","url":null,"abstract":"Online financial transactions play a crucial role in today’s economy. It becomes an unavoidable part of the business and global activities. Transaction fraud executes thoughtful intimidations to e-commerce spending. Now-a-days, the online contract or business is fetching additional sound by knowing the types of online transaction frauds associated with, these are raising which disturbs the currency accompanying business. It has the capability to confine and encumber the contract accomplished by the intruder from an honest consumer’s credit card information. In order to avoid such a problem, the proposed system is established transaction limit for the customers. Efficient data is only considered for detecting fraudulent user action and it happens only at the time of registration. Transaction which is happening for any individual is not at all known to any FDS (Fraud Detection System) consecutively at the bank which mainly issues credit cards to customers. To speak out this problem, BLA (Behaviour and Location Analysis) is executed. The FDS tracks at a credit card provided by bank. All the inbound business is directed to the FDS aimed at confirmation, authentication and verification. FDS catches the card particulars and matter to confirm that the operation is fake or genuine. The pick-up merchandises are unknown to Fraud Detection System. If the transaction is assumed to be fraud, then the corresponding bank declines it. In order to verify the individuality, uniqueness or originality, it uses spending patterns and geographical area. In case, if any suspicious pattern is identified or detected, the FDS system needs verification. The information which is already registered by the user, the system identifies infrequent outlines in the disbursement method. After three invalid attempts, the system will hinder the user. In this proposed system, most of the algorithms are checked and investigated for online financial fraud detection techniques.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dementia People Tracking System 痴呆症患者追踪系统
Pub Date : 2021-12-01 DOI: 10.3233/apc210273
S. Deepa, Lavanya Dhanesh, Danusha V, Divya Dath K, Pavadhaarini G K, Shobana Sri C
The number of elderly people worldwide is rigidly increasing due to decrease in birth rates and innovations implemented in medical field. Due to the increase in elderly people population diseases like dementia are also being increased year by year. Having done many kinds of research it is found that there is no permanent treatment for diseases like dementia, even if those patients come in public they look similar to normal people, however, people with dementia have abnormal behaviors like loss of patience, aggression, lack of thinking which in turn causes burden to family members and caretakers. In order to address this issues, this paper demonstrates a follow-up and rescue program for the elderly. The system includes a GPS receiver, a GSM module and a long-distance RF transmitter and receiver, real-time location. Families and care takers can obtain real-time information and history of patient location through GPS to avoid loss of elderly patients. With the help of this system, the number of losing patients will be decreased and the pressure on the caretakers and family people will be cut down to some extent.
由于出生率的下降和医疗领域的创新,世界范围内的老年人数量正在急剧增加。由于老年人口的增加,痴呆症等疾病也在逐年增加。经过多次研究发现,像痴呆症这样的疾病没有永久性的治疗方法,即使这些患者出现在公众面前,他们看起来和正常人一样,但是痴呆症患者会出现异常行为,如失去耐心,攻击性,缺乏思考,从而给家庭成员和照顾者带来负担。为了解决这一问题,本文展示了一个针对老年人的跟踪和救援方案。该系统包括一个GPS接收器、一个GSM模块和一个远距离射频收发器,实现实时定位。家属和照顾者可以通过GPS实时获取患者位置信息和历史,避免老年患者的丢失。在这个系统的帮助下,失去病人的数量将会减少,照顾者和家属的压力将会在一定程度上减少。
{"title":"Dementia People Tracking System","authors":"S. Deepa, Lavanya Dhanesh, Danusha V, Divya Dath K, Pavadhaarini G K, Shobana Sri C","doi":"10.3233/apc210273","DOIUrl":"https://doi.org/10.3233/apc210273","url":null,"abstract":"The number of elderly people worldwide is rigidly increasing due to decrease in birth rates and innovations implemented in medical field. Due to the increase in elderly people population diseases like dementia are also being increased year by year. Having done many kinds of research it is found that there is no permanent treatment for diseases like dementia, even if those patients come in public they look similar to normal people, however, people with dementia have abnormal behaviors like loss of patience, aggression, lack of thinking which in turn causes burden to family members and caretakers. In order to address this issues, this paper demonstrates a follow-up and rescue program for the elderly. The system includes a GPS receiver, a GSM module and a long-distance RF transmitter and receiver, real-time location. Families and care takers can obtain real-time information and history of patient location through GPS to avoid loss of elderly patients. With the help of this system, the number of losing patients will be decreased and the pressure on the caretakers and family people will be cut down to some extent.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coronary Illness Prediction Using Random Forest Classifier 基于随机森林分类器的冠心病预测
Pub Date : 2021-12-01 DOI: 10.3233/apc210285
Rekha G, Shanthini B, Ranjith Kumar V
Heart diseases or Cardiovascular Diseases (CVDs) are the main cause of death on the planet throughout the most recent years and become the most dangerous disease in India and the entire world. The UCI repository is utilized to calculate the exactness of the AI calculations for foreseeing coronary illness, as k-nearest neighbor, decision tree, linear regression, and support vector machine. Different indications like chest pain, fasting of heartbeat, etc., are referenced. Large datasets, which are not available in medical and clinical research, are required in order to apply deep learning techniques. Surrogate data is generated from Cleveland dataset. The predicted results show that there is an improvement in classification accuracy. Heart disease is one of the most challenging diseases to diagnose as it is the most recognized killer in the present day. Utilizing AI algorithms, this paper gives anticipating coronary illness. Here, we will use the various machine learning algorithms such as Support Vector Machine, Random Forest, KNN, Naive Bayes, Decision Tree and LR.
近年来,心脏病或心血管疾病(cvd)是地球上死亡的主要原因,成为印度和全世界最危险的疾病。利用UCI库计算人工智能预测冠状动脉疾病计算的准确性,如k近邻、决策树、线性回归和支持向量机。不同的适应症,如胸痛,心跳加快等。为了应用深度学习技术,需要在医学和临床研究中无法获得的大型数据集。代理数据是从Cleveland数据集生成的。预测结果表明,分类精度有所提高。心脏病是诊断最具挑战性的疾病之一,因为它是当今最公认的杀手。利用人工智能算法对冠心病进行预测。在这里,我们将使用各种机器学习算法,如支持向量机,随机森林,KNN,朴素贝叶斯,决策树和LR。
{"title":"Coronary Illness Prediction Using Random Forest Classifier","authors":"Rekha G, Shanthini B, Ranjith Kumar V","doi":"10.3233/apc210285","DOIUrl":"https://doi.org/10.3233/apc210285","url":null,"abstract":"Heart diseases or Cardiovascular Diseases (CVDs) are the main cause of death on the planet throughout the most recent years and become the most dangerous disease in India and the entire world. The UCI repository is utilized to calculate the exactness of the AI calculations for foreseeing coronary illness, as k-nearest neighbor, decision tree, linear regression, and support vector machine. Different indications like chest pain, fasting of heartbeat, etc., are referenced. Large datasets, which are not available in medical and clinical research, are required in order to apply deep learning techniques. Surrogate data is generated from Cleveland dataset. The predicted results show that there is an improvement in classification accuracy. Heart disease is one of the most challenging diseases to diagnose as it is the most recognized killer in the present day. Utilizing AI algorithms, this paper gives anticipating coronary illness. Here, we will use the various machine learning algorithms such as Support Vector Machine, Random Forest, KNN, Naive Bayes, Decision Tree and LR.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131519851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Recent Trends in Intensive Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1