首页 > 最新文献

2021 Sixth International Conference on Image Information Processing (ICIIP)最新文献

英文 中文
Experimentation with NMT models on low resource Indic languages NMT模型在低资源印度语上的实验
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702577
Nikunj Bansal, Goutam Datta, Ashutosh Kumar Singh
Today’s Artificial Intelligence (AI) is data centric. Unlike earlier rule based systems where we used to write many rules to solve any specific problem, these days, we need to train our machine learning models with the help of huge corpus (data set). In this paper, we have discussed one of the important applications of AI and computational linguistic i.e. Machine Translation (MT) which translates one natural language to another automatically.MT industry has passed through different phases since its earlier popular approach such as statistical machine translation (SMT) systems and its other version such as phrase based SMT. Performance wise NMT always outperformed SMT on various aspects. However, this holds true only for the languages having large parallel corpora. For low-resource languages, it still remains suboptimal. In this paper, we have applied NMT to low resources Indian languages, i.e. English-Hindi. We used a basic LSTM based Seq2Seq model and an attention-based Seq2Seq model with fixed vocabulary size. We merged the corpus collected from various sources and preprocessed them for further use. We used the BLEU metric score for evaluation. We also evaluated the Google Translator to compare our experimental results with it.
今天的人工智能(AI)是以数据为中心的。与早期基于规则的系统不同,我们过去常常编写许多规则来解决任何特定问题,现在,我们需要在庞大的语料库(数据集)的帮助下训练我们的机器学习模型。本文讨论了人工智能和计算语言学的重要应用之一,即机器翻译(MT),它将一种自然语言自动翻译成另一种自然语言。从早期流行的统计机器翻译(SMT)系统到基于短语的SMT系统,机器翻译行业经历了不同的阶段。在性能方面,NMT在各个方面都优于SMT。然而,这只适用于具有大量平行语料库的语言。对于低资源语言,它仍然是次优的。在本文中,我们将NMT应用于低资源的印度语言,即英语-印地语。我们使用了一个基本的基于LSTM的Seq2Seq模型和一个固定词汇量的基于注意力的Seq2Seq模型。我们合并了从不同来源收集的语料库,并对其进行预处理以供进一步使用。我们使用BLEU度量评分进行评估。我们还对谷歌翻译进行了评估,将我们的实验结果与它进行了比较。
{"title":"Experimentation with NMT models on low resource Indic languages","authors":"Nikunj Bansal, Goutam Datta, Ashutosh Kumar Singh","doi":"10.1109/ICIIP53038.2021.9702577","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702577","url":null,"abstract":"Today’s Artificial Intelligence (AI) is data centric. Unlike earlier rule based systems where we used to write many rules to solve any specific problem, these days, we need to train our machine learning models with the help of huge corpus (data set). In this paper, we have discussed one of the important applications of AI and computational linguistic i.e. Machine Translation (MT) which translates one natural language to another automatically.MT industry has passed through different phases since its earlier popular approach such as statistical machine translation (SMT) systems and its other version such as phrase based SMT. Performance wise NMT always outperformed SMT on various aspects. However, this holds true only for the languages having large parallel corpora. For low-resource languages, it still remains suboptimal. In this paper, we have applied NMT to low resources Indian languages, i.e. English-Hindi. We used a basic LSTM based Seq2Seq model and an attention-based Seq2Seq model with fixed vocabulary size. We merged the corpus collected from various sources and preprocessed them for further use. We used the BLEU metric score for evaluation. We also evaluated the Google Translator to compare our experimental results with it.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building Adaptive Software Reusable Components Using Domain Engineering 使用领域工程构建自适应软件可重用组件
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702594
Sampath Korra, V. Biksham, Nagunuri Rajender, Tippireddy Chalama Reddy
Building Adaptive Software reusable components are one of the main advantage of Component Based Software Engineering (CBSE). The long-term benefits of an exhaustive domain analysis is that captures the requisites of past, as well as future systems within the domain development of reusable software components and supports the application specific development of the domain. Software developers can use a plug and play approach to facilitate the development and integration of software reusable components. Software reuse procedures and processes should be integrated into the existing software development process, so that software asset library should be created and maintained, so that they will contribute to the design and reuse of software assets. This paper specifies the utilization of software reuse principles, domain engineering techniques, process architecture, process modeling mechanisms and project-categorical processes can be abstracted into reusable components that can be utilized by process engineers.
构建自适应软件可重用组件是基于组件的软件工程(CBSE)的主要优势之一。详尽的领域分析的长期好处是,它捕获了可重用软件组件领域开发中过去以及未来系统的必要条件,并支持特定于应用程序的领域开发。软件开发人员可以使用即插即用的方法来促进软件可重用组件的开发和集成。软件重用过程和过程应该集成到现有的软件开发过程中,这样软件资产库就应该被创建和维护,这样它们将有助于软件资产的设计和重用。本文详细说明了利用软件重用原则、领域工程技术、过程体系结构、过程建模机制和项目分类过程可以抽象为可重用组件,供过程工程师使用。
{"title":"Building Adaptive Software Reusable Components Using Domain Engineering","authors":"Sampath Korra, V. Biksham, Nagunuri Rajender, Tippireddy Chalama Reddy","doi":"10.1109/ICIIP53038.2021.9702594","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702594","url":null,"abstract":"Building Adaptive Software reusable components are one of the main advantage of Component Based Software Engineering (CBSE). The long-term benefits of an exhaustive domain analysis is that captures the requisites of past, as well as future systems within the domain development of reusable software components and supports the application specific development of the domain. Software developers can use a plug and play approach to facilitate the development and integration of software reusable components. Software reuse procedures and processes should be integrated into the existing software development process, so that software asset library should be created and maintained, so that they will contribute to the design and reuse of software assets. This paper specifies the utilization of software reuse principles, domain engineering techniques, process architecture, process modeling mechanisms and project-categorical processes can be abstracted into reusable components that can be utilized by process engineers.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130751946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Tampering Image Using SIFT Descriptor 基于SIFT描述符的篡改图像识别
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702601
Debjani Chakraborty, Sandeep Choudhury, Sanjib Kumar Dutta, Biswajit Haldar
In the recent era, image tampering has become one of the threatening security problems in digital platforms. There are many software’s available for tampering with an image that depicts as an original image. Different tampering techniques are used to hide important portions from an image or document, one very common practice is a copy-move forgery that is quite impossible to distinguish with an open eye. Authentications of such images are an ardent research area in image processing and computer vision but still a challenging problem. This paper presents a method to identify image tampering that is based on SIFT (Scale Invariant Feature Transform) algorithm. SIFT descriptor is used to extract keypoint features from the input image and a hierarchical clustering algorithm is used to improve the accuracy of identifying the tampered location. The execution time of our proposed method is proportional to image resolution. If one portion of the image is copied and pasted on multiple locations on the same image, our proposed method can identify such occurrences. Finally, Homography is used to show the tampering points and their matching.
近年来,图像篡改已成为威胁数字平台安全的问题之一。有许多软件可用于篡改描绘为原始图像的图像。不同的篡改技术用于隐藏图像或文档中的重要部分,一种非常常见的做法是复制-移动伪造,这是完全不可能用肉眼区分的。这些图像的身份验证是图像处理和计算机视觉领域的一个热门研究领域,但仍然是一个具有挑战性的问题。提出了一种基于SIFT (Scale Invariant Feature Transform)算法的图像篡改识别方法。利用SIFT描述子从输入图像中提取关键点特征,并采用分层聚类算法提高篡改位置识别的准确性。该方法的执行时间与图像分辨率成正比。如果图像的一部分被复制粘贴到同一图像的多个位置,我们提出的方法可以识别这种情况。最后,利用单应性表示篡改点及其匹配情况。
{"title":"Identification of Tampering Image Using SIFT Descriptor","authors":"Debjani Chakraborty, Sandeep Choudhury, Sanjib Kumar Dutta, Biswajit Haldar","doi":"10.1109/ICIIP53038.2021.9702601","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702601","url":null,"abstract":"In the recent era, image tampering has become one of the threatening security problems in digital platforms. There are many software’s available for tampering with an image that depicts as an original image. Different tampering techniques are used to hide important portions from an image or document, one very common practice is a copy-move forgery that is quite impossible to distinguish with an open eye. Authentications of such images are an ardent research area in image processing and computer vision but still a challenging problem. This paper presents a method to identify image tampering that is based on SIFT (Scale Invariant Feature Transform) algorithm. SIFT descriptor is used to extract keypoint features from the input image and a hierarchical clustering algorithm is used to improve the accuracy of identifying the tampered location. The execution time of our proposed method is proportional to image resolution. If one portion of the image is copied and pasted on multiple locations on the same image, our proposed method can identify such occurrences. Finally, Homography is used to show the tampering points and their matching.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Color Image Watermarking Scheme with High Payload Capacity using FRT - SVD 基于FRT - SVD的高有效载荷鲁棒彩色图像水印方案
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702542
Rohit M. Thanki, Purva Joshi
When any color image transfers through an open-source communication channel, then the security of the color image is compromised against various manipulations. Therefore, the attacker has easily stolen any important color image when transferred from one place to another. For this problem, one of the solutions is digital watermarking, which provides security when data communicate through a channel. But most existing watermarking schemes can hide a small amount of owner identity into a color image to generate a secure watermarked color image. In this paper, a ridgelet transform and singular value decomposition-based watermarking scheme is proposed to tackle this problem, which provides higher payload capacity. Here, the color watermark logo is inserted into singular value of ridgelet coefficients of the color cover image to get the color watermarked image. After that, scrambling-based encryption is applied to it to get an encrypted color watermarked image that provides security before transmission. The experimental results of the proposed scheme show that this new scheme offers better payload capacity and performs better than existing color watermarking schemes.
当任何彩色图像通过开源通信通道传输时,那么彩色图像的安全性就会受到各种操作的损害。因此,攻击者很容易窃取任何重要的彩色图像从一个地方转移到另一个地方。针对这个问题,解决方案之一是数字水印,它可以在数据通过信道通信时提供安全性。但现有的大多数水印方案都可以在彩色图像中隐藏少量的所有者身份信息,从而生成安全的彩色水印图像。本文提出了一种基于脊波变换和奇异值分解的水印方案来解决这一问题,该方案提供了更高的有效载荷容量。该方法将彩色水印图像插入到彩色封面图像脊波系数的奇异值中,得到彩色水印图像。然后对其进行加扰加密,得到加密后的彩色水印图像,保证传输前的安全性。实验结果表明,与现有的彩色水印方案相比,该方案具有更好的有效载荷能力和性能。
{"title":"Robust Color Image Watermarking Scheme with High Payload Capacity using FRT - SVD","authors":"Rohit M. Thanki, Purva Joshi","doi":"10.1109/ICIIP53038.2021.9702542","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702542","url":null,"abstract":"When any color image transfers through an open-source communication channel, then the security of the color image is compromised against various manipulations. Therefore, the attacker has easily stolen any important color image when transferred from one place to another. For this problem, one of the solutions is digital watermarking, which provides security when data communicate through a channel. But most existing watermarking schemes can hide a small amount of owner identity into a color image to generate a secure watermarked color image. In this paper, a ridgelet transform and singular value decomposition-based watermarking scheme is proposed to tackle this problem, which provides higher payload capacity. Here, the color watermark logo is inserted into singular value of ridgelet coefficients of the color cover image to get the color watermarked image. After that, scrambling-based encryption is applied to it to get an encrypted color watermarked image that provides security before transmission. The experimental results of the proposed scheme show that this new scheme offers better payload capacity and performs better than existing color watermarking schemes.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-spoofing Performance Enhancement by Facial Micro-expression Detection using Kinect Sensor 基于Kinect传感器的面部微表情检测增强抗欺骗性能
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702679
A. Pal, Debmani Saha
Face detection is a point of interest in many systems. Due to the reason of being less-intrusive characteristic. But various systems are not that much capable of preventing high-level facial spoofing attacks. The attacks are generally done by 3D printed masks or eye-cut photos etc. Detecting micro-expressions in this case can make those systems invulnerable to the attacks because micro-expressions are the only expressions that cannot be controlled. In this article, an approach to detect the micro-expressions of the face has been shown. With the successful detection of micro-expression, the liveness of the face can be detected using a histogram of gradient (HOG) descriptor. This descriptor is used to detect the change in pixel intensities. The descriptor has been applied on specific ROI of the face image i.e., two eyes, nose, and lips of the detected face. The dataset utilized in this project is self-created. The device used to capture the snaps of the dataset is Kinect Xbox One. This approach is effective in preventing such face spoofing attacks.
人脸检测是许多系统感兴趣的一点。由于具有侵入性较小的特点。但是,各种系统都没有那么多的能力来防止高级面部欺骗攻击。攻击通常是通过3D打印面具或眼睛切割照片等来完成的。在这种情况下,检测微表情可以使这些系统免受攻击,因为微表情是唯一无法控制的表情。本文提出了一种检测人脸微表情的方法。在成功检测微表情后,可以使用梯度直方图(HOG)描述符检测人脸的活跃度。这个描述符用于检测像素强度的变化。该描述符被应用于人脸图像的特定ROI,即被检测人脸的两只眼睛、鼻子和嘴唇。本项目使用的数据集是自行创建的。用于捕捉数据集快照的设备是Kinect Xbox One。这种方法可以有效地防止人脸欺骗攻击。
{"title":"Anti-spoofing Performance Enhancement by Facial Micro-expression Detection using Kinect Sensor","authors":"A. Pal, Debmani Saha","doi":"10.1109/ICIIP53038.2021.9702679","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702679","url":null,"abstract":"Face detection is a point of interest in many systems. Due to the reason of being less-intrusive characteristic. But various systems are not that much capable of preventing high-level facial spoofing attacks. The attacks are generally done by 3D printed masks or eye-cut photos etc. Detecting micro-expressions in this case can make those systems invulnerable to the attacks because micro-expressions are the only expressions that cannot be controlled. In this article, an approach to detect the micro-expressions of the face has been shown. With the successful detection of micro-expression, the liveness of the face can be detected using a histogram of gradient (HOG) descriptor. This descriptor is used to detect the change in pixel intensities. The descriptor has been applied on specific ROI of the face image i.e., two eyes, nose, and lips of the detected face. The dataset utilized in this project is self-created. The device used to capture the snaps of the dataset is Kinect Xbox One. This approach is effective in preventing such face spoofing attacks.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Brain Tumor Detection Using Modified Tree Growth Algorithm and Random Forest Method 基于改进树生长算法和随机森林方法的脑肿瘤检测
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702692
Ratima Raj Singh, Surbhi Vijh, Diwakar Chaubey
Medical image processing techniques are believed to diagnose the tumor to improve the patient's survival rate. This paper proposed an improved nature-based Tree Growth algorithm (TGA) for selecting the finest features from the feature set derived by the Local Binary Pattern (LBP) and Gray level co-occurrence matrix (GLCM), the images from Brain Magnetic resonance images (MRI) classified as tumor or non-tumor by Random Forest (RF) classifier. The significance of this paper is the creation of an intelligent brain tumor diagnostic system using a Chaotic modified binary tree growth algorithm (CMBTGA-RF). The chaotic map, crossover, and mutation operators are implemented in an updated binary tree growth algorithm for improving exploitation and exploration behaviours. The performance of the proposed methodology is assessed with accuracy, sensitivity, specificity, precision, negative predictive value (NPV), and F-score of 96.42%, 100%, 94.11%, 91.66%, 100%, and 96.96% respectively. The algorithmic findings demonstrate that the CMBTGA-RF with Logistic map works better than the nature-based traditional and recent meta-heuristic algorithms.
医学图像处理技术被认为可以诊断肿瘤,提高患者的生存率。本文提出了一种改进的基于自然的树生长算法(TGA),用于从局部二值模式(LBP)和灰度共生矩阵(GLCM)得到的特征集中选择最优特征,并用随机森林(RF)分类器将脑磁共振图像(MRI)分类为肿瘤或非肿瘤。本文的意义在于利用混沌改进二叉树生长算法(CMBTGA-RF)构建智能脑肿瘤诊断系统。混沌映射、交叉和突变算子在更新的二叉树生长算法中实现,以改善开发和勘探行为。方法的准确性、敏感性、特异性、精密度、阴性预测值(NPV)和f评分分别为96.42%、100%、94.11%、91.66%、100%和96.96%。算法结果表明,基于Logistic映射的CMBTGA-RF算法比基于自然的传统和最近的元启发式算法效果更好。
{"title":"An Efficient Brain Tumor Detection Using Modified Tree Growth Algorithm and Random Forest Method","authors":"Ratima Raj Singh, Surbhi Vijh, Diwakar Chaubey","doi":"10.1109/ICIIP53038.2021.9702692","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702692","url":null,"abstract":"Medical image processing techniques are believed to diagnose the tumor to improve the patient's survival rate. This paper proposed an improved nature-based Tree Growth algorithm (TGA) for selecting the finest features from the feature set derived by the Local Binary Pattern (LBP) and Gray level co-occurrence matrix (GLCM), the images from Brain Magnetic resonance images (MRI) classified as tumor or non-tumor by Random Forest (RF) classifier. The significance of this paper is the creation of an intelligent brain tumor diagnostic system using a Chaotic modified binary tree growth algorithm (CMBTGA-RF). The chaotic map, crossover, and mutation operators are implemented in an updated binary tree growth algorithm for improving exploitation and exploration behaviours. The performance of the proposed methodology is assessed with accuracy, sensitivity, specificity, precision, negative predictive value (NPV), and F-score of 96.42%, 100%, 94.11%, 91.66%, 100%, and 96.96% respectively. The algorithmic findings demonstrate that the CMBTGA-RF with Logistic map works better than the nature-based traditional and recent meta-heuristic algorithms.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical Programme Schedule for ICIIP-2021 ICIIP-2021技术方案时间表
Pub Date : 2021-11-26 DOI: 10.1109/iciip53038.2021.9702589
{"title":"Technical Programme Schedule for ICIIP-2021","authors":"","doi":"10.1109/iciip53038.2021.9702589","DOIUrl":"https://doi.org/10.1109/iciip53038.2021.9702589","url":null,"abstract":"","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134534820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Analytics in Cloud Computing 云计算中的大数据分析
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702705
N. Suhasini, Srilatha Puli
In this paper we will study the two unlike but related technologies – Big Data and cloud computing – and also examines the benefits and outcomes of using cloud computing for Big Data analytics. As information is being produced at a phenomenal scale and it is originating from every direction, such a monstrous measure of information makes enormous or complex informational indexes. These informational collections are known as Big Data. The blend of cloud and big data can be attributed to fresh IT (Information Technology) wave that is causing remarkable progress across IT departments of various industries. In this new environment of big data and cloud there are challenges associated with data storage as data are accumulating rapidly.With rapidly expansion of Big data requires government agencies to extract relevant data and make sense of it in order to make evidence-based policy decisions, with a focus on translating data into information and subsequently information into knowledge. The way to do this is to employ so-called big data analytics, which involves analyzing numerous data sets in order to reveal information such as specific patterns, correlations, and trends, among other things.Big data analytics places rigorous needs on networks, storage, and servers. This is why few businesses use the cloud for this. Big data and cloud are combining to create new business prospects that support big data research while also overcoming numerous architectural challenges.For these mutually exclusive principles to coexist a solution architecture is required to truly exploit. Future breakthroughs and research difficulties in cloud computing that support Big Data analytics are presented in this review.
在本文中,我们将研究两种不同但相关的技术——大数据和云计算——并研究使用云计算进行大数据分析的好处和结果。由于信息以惊人的规模产生,而且来自四面八方,如此庞大的信息量构成了庞大或复杂的信息指数。这些信息集合被称为大数据。云计算和大数据的融合可以归因于新的IT(信息技术)浪潮,这使得各行各业的IT部门取得了显着的进步。在这个大数据和云的新环境中,随着数据的快速积累,数据存储面临着挑战。随着大数据的迅速扩张,政府机构需要提取相关数据并对其进行理解,以制定基于证据的政策决策,重点是将数据转化为信息,进而将信息转化为知识。做到这一点的方法是使用所谓的大数据分析,它涉及分析大量数据集,以揭示诸如特定模式、相关性和趋势等信息。大数据分析对网络、存储和服务器提出了严格的要求。这就是为什么很少有企业使用云计算。大数据和云的结合创造了新的业务前景,支持大数据研究,同时也克服了众多架构挑战。为了使这些互斥原则共存,需要真正利用解决方案体系结构。本文介绍了支持大数据分析的云计算的未来突破和研究难点。
{"title":"Big Data Analytics in Cloud Computing","authors":"N. Suhasini, Srilatha Puli","doi":"10.1109/ICIIP53038.2021.9702705","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702705","url":null,"abstract":"In this paper we will study the two unlike but related technologies – Big Data and cloud computing – and also examines the benefits and outcomes of using cloud computing for Big Data analytics. As information is being produced at a phenomenal scale and it is originating from every direction, such a monstrous measure of information makes enormous or complex informational indexes. These informational collections are known as Big Data. The blend of cloud and big data can be attributed to fresh IT (Information Technology) wave that is causing remarkable progress across IT departments of various industries. In this new environment of big data and cloud there are challenges associated with data storage as data are accumulating rapidly.With rapidly expansion of Big data requires government agencies to extract relevant data and make sense of it in order to make evidence-based policy decisions, with a focus on translating data into information and subsequently information into knowledge. The way to do this is to employ so-called big data analytics, which involves analyzing numerous data sets in order to reveal information such as specific patterns, correlations, and trends, among other things.Big data analytics places rigorous needs on networks, storage, and servers. This is why few businesses use the cloud for this. Big data and cloud are combining to create new business prospects that support big data research while also overcoming numerous architectural challenges.For these mutually exclusive principles to coexist a solution architecture is required to truly exploit. Future breakthroughs and research difficulties in cloud computing that support Big Data analytics are presented in this review.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A color image watermarking in the frequency domain using a teaching-learning optimization algorithm 基于教-学优化算法的彩色图像频域水印
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702645
Nikhlesh Kumar Badoga, Raman Kumar Goyal, R. Mehta
This paper presents a color image watermark technique that employs teaching learning-based optimization algorithm (TLBO) and lagrangian twin support vector regression (LTSVR) in the frequency domain. By analyzing the statistical property of the selected wavelet band (LL sub-band) after single-level decomposition, LTSVR is used for extraction of watermark and embedding processes. TLBO is used to find the optimal value of watermark strength for different selected blocks of the image in the wavelet domain. Various kinds of images are considered to test the imperceptibility and robustness of the watermark in experimental results. The metric Peak Signal to Noise Ratio (PSNR) has been used for watermark images to evaluate the: (i) imperceptibility, (ii) quality. Bit error rate (BER) and normalized correlation (NC) value is computed to determine the effectiveness and standards of the extracted watermark. JPEG compression attack with different quality factors (QF) ranging from 10 to 90 is evaluated using robustness to determine the proficiency of the proposed work. Experimental results show that the proposed method is robust to JPEG compression as compared to state of art method.
提出了一种采用基于教学学习的优化算法(TLBO)和拉格朗日孪生支持向量回归(LTSVR)的频域彩色图像水印技术。通过分析单级分解后选取的小波带(LL子带)的统计特性,将LTSVR用于水印提取和嵌入过程。TLBO算法用于在小波域中对图像的不同块进行水印强度的优化。在实验结果中考虑了不同类型的图像来测试水印的不可感知性和鲁棒性。度量峰值信噪比(PSNR)被用于水印图像评估:(1)不可感知性,(2)质量。计算误码率(BER)和归一化相关(NC)值,以确定提取水印的有效性和标准。利用鲁棒性评估了不同质量因子(QF)范围为10到90的JPEG压缩攻击,以确定所提出工作的熟练程度。实验结果表明,与现有方法相比,该方法对JPEG压缩具有较强的鲁棒性。
{"title":"A color image watermarking in the frequency domain using a teaching-learning optimization algorithm","authors":"Nikhlesh Kumar Badoga, Raman Kumar Goyal, R. Mehta","doi":"10.1109/ICIIP53038.2021.9702645","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702645","url":null,"abstract":"This paper presents a color image watermark technique that employs teaching learning-based optimization algorithm (TLBO) and lagrangian twin support vector regression (LTSVR) in the frequency domain. By analyzing the statistical property of the selected wavelet band (LL sub-band) after single-level decomposition, LTSVR is used for extraction of watermark and embedding processes. TLBO is used to find the optimal value of watermark strength for different selected blocks of the image in the wavelet domain. Various kinds of images are considered to test the imperceptibility and robustness of the watermark in experimental results. The metric Peak Signal to Noise Ratio (PSNR) has been used for watermark images to evaluate the: (i) imperceptibility, (ii) quality. Bit error rate (BER) and normalized correlation (NC) value is computed to determine the effectiveness and standards of the extracted watermark. JPEG compression attack with different quality factors (QF) ranging from 10 to 90 is evaluated using robustness to determine the proficiency of the proposed work. Experimental results show that the proposed method is robust to JPEG compression as compared to state of art method.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing: A relevant Solution for Drug Designing using different Software’s 云计算:使用不同软件进行药物设计的相关解决方案
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702618
Tejinder Kaur, Divya Dhawal Bhandari, Rajiv Sharma
Cloud computing as a part of artificial intelligence (AI) is the big source for researchers who are focusing on drug designing and development. Cloud computing provides us a platform for not using traditional methods of drug designing which is time-consuming and also requires very high investments of infrastructure, manpower, and chemical requirements. Drug designing software has a pivotal role potential in designing the drug concerning biotechnology and pharmaceutical sciences. All software is well known to be used for analyzing drug molecules, gene expression, and sequence, and 3D structure of proteins and chemical compounds. This review article summarizes the importance of cloud computing in structure-based drug designing and development. This review also emphasizes the top companies providing the software for drug designing and development.
作为人工智能(AI)的一部分,云计算是专注于药物设计和开发的研究人员的主要来源。云计算为我们提供了一个不使用传统药物设计方法的平台,这种方法既耗时又需要非常高的基础设施、人力和化学需求的投资。药物设计软件在生物技术和药学领域的药物设计中具有举足轻重的作用和潜力。所有的软件都是众所周知的用于分析药物分子,基因表达和序列,以及蛋白质和化合物的3D结构。本文综述了云计算在基于结构的药物设计和开发中的重要性。本文还重点介绍了为药物设计和开发提供软件的顶级公司。
{"title":"Cloud Computing: A relevant Solution for Drug Designing using different Software’s","authors":"Tejinder Kaur, Divya Dhawal Bhandari, Rajiv Sharma","doi":"10.1109/ICIIP53038.2021.9702618","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702618","url":null,"abstract":"Cloud computing as a part of artificial intelligence (AI) is the big source for researchers who are focusing on drug designing and development. Cloud computing provides us a platform for not using traditional methods of drug designing which is time-consuming and also requires very high investments of infrastructure, manpower, and chemical requirements. Drug designing software has a pivotal role potential in designing the drug concerning biotechnology and pharmaceutical sciences. All software is well known to be used for analyzing drug molecules, gene expression, and sequence, and 3D structure of proteins and chemical compounds. This review article summarizes the importance of cloud computing in structure-based drug designing and development. This review also emphasizes the top companies providing the software for drug designing and development.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 Sixth International Conference on Image Information Processing (ICIIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1