首页 > 最新文献

2021 Sixth International Conference on Image Information Processing (ICIIP)最新文献

英文 中文
Smart Manufacturing Technologies in Industry-4.0 工业4.0中的智能制造技术
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702613
M. Maheswari, N. Brintha
Manufacturing is the process of producing effective products through the use of machinery, labor, tools and well-formulated theory. During the manufacturing process, industries experience various kinds of provocations, including unexpected failures of equipment and machines, downtime failures and products delivered in an imperfect way. In industry 4.0, smart manufacturing is used to rectify these challenges and faults during the manufacturing process and it includes all intermediate processes required for the integration of smart manufacturing technologies into industry. In detail, digital technology has been applied to the face of the industrial and manufacturing world, which is called smart manufacturing. This paper presents the technologies involved in the manufacturing process in a smart way in Industry 4.0. The merging of various emerging technologies such as the Internet of Things (IoT), Cyber Security, Big Data, Cloud Computing, Automation, Augmented Reality and virtual reality have been enabled in the industry 4.0. These technologies are used to upgrade how manufacturers improve and enhance operational efficiency, develop and launch new products with quality, design customized products and AI with digital transformations are used to make the manufacturing process smarter in the industry.
制造业是通过使用机器、劳动力、工具和精心制定的理论来生产有效产品的过程。在制造过程中,行业会经历各种各样的挑衅,包括设备和机器的意外故障,停机故障和产品交付的不完美方式。在工业4.0中,智能制造被用来纠正制造过程中的这些挑战和故障,它包括将智能制造技术集成到工业中所需的所有中间过程。具体来说,数字技术已经被应用到工业和制造业世界的面孔上,这就是所谓的智能制造。本文以智能的方式介绍了工业4.0中制造过程中涉及的技术。物联网(IoT)、网络安全、大数据、云计算、自动化、增强现实和虚拟现实等各种新兴技术的融合已经在工业4.0中实现。这些技术用于升级制造商如何改善和提高运营效率,开发和推出高质量的新产品,设计定制产品,以及使用数字化转型的人工智能使制造过程更加智能。
{"title":"Smart Manufacturing Technologies in Industry-4.0","authors":"M. Maheswari, N. Brintha","doi":"10.1109/ICIIP53038.2021.9702613","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702613","url":null,"abstract":"Manufacturing is the process of producing effective products through the use of machinery, labor, tools and well-formulated theory. During the manufacturing process, industries experience various kinds of provocations, including unexpected failures of equipment and machines, downtime failures and products delivered in an imperfect way. In industry 4.0, smart manufacturing is used to rectify these challenges and faults during the manufacturing process and it includes all intermediate processes required for the integration of smart manufacturing technologies into industry. In detail, digital technology has been applied to the face of the industrial and manufacturing world, which is called smart manufacturing. This paper presents the technologies involved in the manufacturing process in a smart way in Industry 4.0. The merging of various emerging technologies such as the Internet of Things (IoT), Cyber Security, Big Data, Cloud Computing, Automation, Augmented Reality and virtual reality have been enabled in the industry 4.0. These technologies are used to upgrade how manufacturers improve and enhance operational efficiency, develop and launch new products with quality, design customized products and AI with digital transformations are used to make the manufacturing process smarter in the industry.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Enabled Dynamic Regimentation of Photo Posting on Online Social Networks 在线社交网络上照片发布的隐私动态管理
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702658
N. Brintha, J. Jappes, S. Lakshmi
Security has become a major concern in today’s IT scenario because of the surge in use of technology aids and wide usage of publically available social networks among people because of its economic viability. Due to these concerns, common users are facing lot of issues which has become a life threatening issue. Public in terms of application provider needs some advertisement business model to offer the application at free of cost, even though the application which are already available have some security features, they completely lag in preserving user privacy, and vice versa. The user of such applications are not aware of the privacy settings configured in the application. Apparently, when a user (X) of an application takes and shares picture from a public place (Museum), the photo may have other users (Y) image as well, without their (Y’s) knowledge it may be available online. Hence, the basic idea behind the solution is to use some face recognition algorithm to identify the other (Y’s) face in the current user (X’s) picture and to intimate the other user (Y) about the occurrence of their picture. With this, the user can provide their decision on whether their picture could be shared or not so as to have control on their access privilege. The proposed approach solves the above problem and provides privacy in posting of photos in online sources. This provides an intimation to the users on their photo sharing.
由于技术辅助工具的使用激增,并且由于其经济可行性,人们广泛使用公共可用的社交网络,因此安全性已成为当今IT场景中的一个主要关注点。由于这些担忧,普通用户面临着许多问题,这些问题已经成为威胁生命的问题。公共应用程序提供商需要某种广告商业模式来免费提供应用程序,即使已经提供的应用程序具有一些安全功能,但它们在保护用户隐私方面完全滞后,反之亦然。此类应用程序的用户不知道应用程序中配置的隐私设置。显然,当应用程序的用户(X)从公共场所(博物馆)拍摄并共享照片时,该照片可能也有其他用户(Y)的图像,在他们(Y)不知情的情况下,它可能在网上可用。因此,解决方案背后的基本思想是使用一些人脸识别算法来识别当前用户(X)照片中另一个(Y)的脸,并让另一个用户(Y)知道他们的照片出现了。这样,用户就可以决定他们的照片是否可以共享,从而控制他们的访问权限。所提出的方法解决了上述问题,并提供了在网上发布照片的隐私。这为用户分享照片提供了提示。
{"title":"Privacy Enabled Dynamic Regimentation of Photo Posting on Online Social Networks","authors":"N. Brintha, J. Jappes, S. Lakshmi","doi":"10.1109/ICIIP53038.2021.9702658","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702658","url":null,"abstract":"Security has become a major concern in today’s IT scenario because of the surge in use of technology aids and wide usage of publically available social networks among people because of its economic viability. Due to these concerns, common users are facing lot of issues which has become a life threatening issue. Public in terms of application provider needs some advertisement business model to offer the application at free of cost, even though the application which are already available have some security features, they completely lag in preserving user privacy, and vice versa. The user of such applications are not aware of the privacy settings configured in the application. Apparently, when a user (X) of an application takes and shares picture from a public place (Museum), the photo may have other users (Y) image as well, without their (Y’s) knowledge it may be available online. Hence, the basic idea behind the solution is to use some face recognition algorithm to identify the other (Y’s) face in the current user (X’s) picture and to intimate the other user (Y) about the occurrence of their picture. With this, the user can provide their decision on whether their picture could be shared or not so as to have control on their access privilege. The proposed approach solves the above problem and provides privacy in posting of photos in online sources. This provides an intimation to the users on their photo sharing.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake Profile Detection from the Social Dataset for Movie Promotion 基于社交数据集的虚假个人资料检测用于电影推广
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702684
Parul Parihar, Devanand, N. Kumar
Product promotion for increasing the sale of the product is critical in today’s competitive environment. Online medium of promotion is vital in this regard. Product promotion especially in the field of movies goes through fake promotion issues. Movies are promoted by the entities through fake rating. This work primary focuses on the detection of fake profiles. To accomplish this collaborative filtering with the pre-processing mechanism is used. Demonstration of work will be done through movie lense dataset. The nature of proposed approach is modular; this means entire work will be divided into phase. Data acquisition is performed in the first phase. After collecting the dataset, pre-processing mechanism is applied by using nominal conversion. Collaborative filtering is applied along with clustering to determine the fake promotion of within movie lense dataset. Nominal conversion is also required since recommender system may not able to handle string values. By the classification accuracy we can show the result of the proposed work.
在当今竞争激烈的环境中,产品促销对于增加产品的销量至关重要。在这方面,在线推广媒介是至关重要的。产品推广,尤其是电影领域的产品推广存在虚假推广问题。电影被实体通过虚假评级来推广。这项工作主要集中在虚假配置文件的检测上。为了实现这种协同过滤,采用了预处理机制。工作演示将通过电影镜头数据集完成。所建议的方法是模块化的;这意味着整个工作将分为几个阶段。数据采集在第一阶段进行。收集数据集后,采用标称转换的预处理机制。将协同过滤与聚类相结合,确定电影镜头数据集中的假推广。还需要标称转换,因为推荐系统可能无法处理字符串值。通过分类精度,我们可以表明所提出的工作的结果。
{"title":"Fake Profile Detection from the Social Dataset for Movie Promotion","authors":"Parul Parihar, Devanand, N. Kumar","doi":"10.1109/ICIIP53038.2021.9702684","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702684","url":null,"abstract":"Product promotion for increasing the sale of the product is critical in today’s competitive environment. Online medium of promotion is vital in this regard. Product promotion especially in the field of movies goes through fake promotion issues. Movies are promoted by the entities through fake rating. This work primary focuses on the detection of fake profiles. To accomplish this collaborative filtering with the pre-processing mechanism is used. Demonstration of work will be done through movie lense dataset. The nature of proposed approach is modular; this means entire work will be divided into phase. Data acquisition is performed in the first phase. After collecting the dataset, pre-processing mechanism is applied by using nominal conversion. Collaborative filtering is applied along with clustering to determine the fake promotion of within movie lense dataset. Nominal conversion is also required since recommender system may not able to handle string values. By the classification accuracy we can show the result of the proposed work.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cognitive Internet of things (CIoT) a success for data collection 认知物联网(CIoT)是数据收集的成功
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702706
F. Fayaz, A. Malik, Arshad Ahmad Yatoo
In conjunction with data generated by intelligent machines, cognitive IoT uses cognitive computing technology and the actions these devices can accomplish. The Cognitive Internet of Things (CIoT) is seen as the new IoT is combined with mental and mutual frameworks to facilitate success and intelligence. This leading research area has recently emerged as intelligent sensing. Researchers examine the sensing data performance problems with Smarter technologies, in which people usually use smart gadgets, contribute training datasets towards the Cognitive Internet of things collected by sensors. Moreover, Cognitive Intent of Things (CIOT), shortcomings in the scope of sensing data, contribute to the loss of human life and civil instability. To answer this problem, we propose a new metric in this article, called the Quality of Information Coverage (QIC), which will personify information distribution and data sensing incentives to leverage the QIC. In addition, a market-based compensation system is being developed to pledge the QIC. To produce optimum kickbacks for CIoT and news outlets, we evaluate the optimal business solution and examine an acceptable representation. Then, by detailed computations, the results of a competition reward system are studied. The findings suggest that the way the method of reward management hits the balance point with a greater QIC than most current systems. The QIC told a system in this work guarantees that, relative to existing algorithms, the sample variance number obtained datasets for specific regions decreases by approximately less than 40 to 55 percent since these data sets are calibrated. Compared to these non-QIC-aware algorithms, the average sale price is Sensing proposed should be less than 17 to 18 percent.
结合智能机器产生的数据,认知物联网使用认知计算技术和这些设备可以完成的动作。认知物联网(CIoT)被视为与精神和相互框架相结合的新物联网,以促进成功和智能。这一领先的研究领域最近出现了智能传感。研究人员研究了智能技术的传感数据性能问题,其中人们通常使用智能设备,为传感器收集的认知物联网提供训练数据集。此外,物的认知意图(CIOT),在传感数据的范围内的缺点,导致人命损失和社会不稳定。为了回答这个问题,我们在本文中提出了一个新的度量标准,称为信息覆盖质量(QIC),它将个性化信息分布和数据感知激励,以利用QIC。此外,政府正在制定一个以市场为基础的补偿制度,以质押QIC。为了给CIoT和新闻媒体带来最优的回扣,我们评估了最优的业务解决方案,并检查了一个可接受的表示。然后,通过详细的计算,研究了一种竞争奖励制度的结果。研究结果表明,与大多数现有系统相比,奖励管理方法达到了更高的QIC平衡点。QIC告诉系统,在这项工作中,相对于现有算法,获得的特定区域数据集的样本方差数减少了大约不到40%到55%,因为这些数据集是经过校准的。与这些非质量感知算法相比,传感提出的平均销售价格应低于17%至18%。
{"title":"Cognitive Internet of things (CIoT) a success for data collection","authors":"F. Fayaz, A. Malik, Arshad Ahmad Yatoo","doi":"10.1109/ICIIP53038.2021.9702706","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702706","url":null,"abstract":"In conjunction with data generated by intelligent machines, cognitive IoT uses cognitive computing technology and the actions these devices can accomplish. The Cognitive Internet of Things (CIoT) is seen as the new IoT is combined with mental and mutual frameworks to facilitate success and intelligence. This leading research area has recently emerged as intelligent sensing. Researchers examine the sensing data performance problems with Smarter technologies, in which people usually use smart gadgets, contribute training datasets towards the Cognitive Internet of things collected by sensors. Moreover, Cognitive Intent of Things (CIOT), shortcomings in the scope of sensing data, contribute to the loss of human life and civil instability. To answer this problem, we propose a new metric in this article, called the Quality of Information Coverage (QIC), which will personify information distribution and data sensing incentives to leverage the QIC. In addition, a market-based compensation system is being developed to pledge the QIC. To produce optimum kickbacks for CIoT and news outlets, we evaluate the optimal business solution and examine an acceptable representation. Then, by detailed computations, the results of a competition reward system are studied. The findings suggest that the way the method of reward management hits the balance point with a greater QIC than most current systems. The QIC told a system in this work guarantees that, relative to existing algorithms, the sample variance number obtained datasets for specific regions decreases by approximately less than 40 to 55 percent since these data sets are calibrated. Compared to these non-QIC-aware algorithms, the average sale price is Sensing proposed should be less than 17 to 18 percent.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Brief Review on Existing Techniques for Detecting Digital Image Forgery 现有数字图像伪造检测技术综述
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702688
Rajneesh Rani, Akshay Kumar, Amrita Rai
Law enforcement in the 21st century works on the evidence present in digital images or videos. Digital image processing is, thus, being heavily applied in the field of law enforcement, especially when it comes to detecting whether digital evidence related to legal matters has been tampered with or not. Due to the easy availability of various software, it is effortless for any law offender to have evidence such as digital images or videos transformed for their cause. Hence, two types of tampering detection techniques are used to maintain the integrity of digital evidence, namely Active and Passive. The active methods require that some kind of pre-embedded data be present in the image, using which detection can be performed while the passive techniques are applicable without any such condition. The differences, working, and classifications of these techniques are elaborately discussed here.
21世纪的执法工作以数字图像或视频中的证据为基础。因此,数字图像处理在执法领域得到了大量应用,特别是在检测与法律事务有关的数字证据是否被篡改时。由于各种软件很容易获得,对于任何罪犯来说,为了他们的理由而转换数字图像或视频等证据都是毫不费力的。因此,有两种类型的篡改检测技术用于保持数字证据的完整性,即主动和被动。主动方法要求在图像中存在某种预嵌入数据,使用这些数据可以执行检测,而被动技术则适用于没有任何此类条件的技术。本文将详细讨论这些技术的区别、工作原理和分类。
{"title":"A Brief Review on Existing Techniques for Detecting Digital Image Forgery","authors":"Rajneesh Rani, Akshay Kumar, Amrita Rai","doi":"10.1109/ICIIP53038.2021.9702688","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702688","url":null,"abstract":"Law enforcement in the 21st century works on the evidence present in digital images or videos. Digital image processing is, thus, being heavily applied in the field of law enforcement, especially when it comes to detecting whether digital evidence related to legal matters has been tampered with or not. Due to the easy availability of various software, it is effortless for any law offender to have evidence such as digital images or videos transformed for their cause. Hence, two types of tampering detection techniques are used to maintain the integrity of digital evidence, namely Active and Passive. The active methods require that some kind of pre-embedded data be present in the image, using which detection can be performed while the passive techniques are applicable without any such condition. The differences, working, and classifications of these techniques are elaborately discussed here.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115246824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Rough Set Based Image Denoising Algorithm 一种基于粗糙集的图像去噪算法
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702657
Rudrajit Choudhuri, Sayan Halder, A. Halder
The primary focus of the paper is towards image enhancement via removal of salt and pepper noise from images. In this paper, a novel statistical approach based on the properties of rough set theory is proposed, where noisy pixel identification and removal are controlled by decision rough parameters. Each enhancement decision is directly governed by four parameters – the pixel is noisy or not, the pixel has any non-noisy neighbor compatible enough to replace it, the deviation of the neighboring pixel from the central pixel value, and matching of the threshold criterion. The four phase decision making algorithm fetches highly accurate results and with consecutive iterations and upgradation, the algorithm is able to remove all noisy pixels while maintaining fine details of the image for even 95% corruption levels.
本文的主要重点是通过去除图像中的盐和胡椒噪声来增强图像。本文提出了一种基于粗糙集理论的统计方法,通过决策粗糙参数控制噪声像素的识别和去除。每个增强决策都直接由四个参数决定:像素是否有噪声,像素是否有足够兼容的无噪声邻居来取代它,相邻像素与中心像素值的偏差,以及阈值准则的匹配。四阶段决策算法获得高度准确的结果,并且通过连续的迭代和升级,该算法能够去除所有噪声像素,同时保持图像的精细细节,即使95%的损坏水平。
{"title":"A Novel Rough Set Based Image Denoising Algorithm","authors":"Rudrajit Choudhuri, Sayan Halder, A. Halder","doi":"10.1109/ICIIP53038.2021.9702657","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702657","url":null,"abstract":"The primary focus of the paper is towards image enhancement via removal of salt and pepper noise from images. In this paper, a novel statistical approach based on the properties of rough set theory is proposed, where noisy pixel identification and removal are controlled by decision rough parameters. Each enhancement decision is directly governed by four parameters – the pixel is noisy or not, the pixel has any non-noisy neighbor compatible enough to replace it, the deviation of the neighboring pixel from the central pixel value, and matching of the threshold criterion. The four phase decision making algorithm fetches highly accurate results and with consecutive iterations and upgradation, the algorithm is able to remove all noisy pixels while maintaining fine details of the image for even 95% corruption levels.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Excavating Communication Using Taxonomy and Outline Mechanisms 一种利用分类和提纲机制挖掘通信的新方法
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702588
A. Srinivas, S. Reddy
Social Network is a standout amongst the most prominent intuitive medium to share, impart and disperse data. Informal organization is the stage to manufacture social relations among individuals. Clients can stay in contact with companions by trading distinctive kinds of data or messages. Now and again individuals send mail which causes a difficult issue similar to irritating or extorting to clients. The mail substance might exist inconsiderate. The terminology like hostile, detest, disgusting and so on are accessible in the mail. Those mails are recognizing as spam utilizing data sifting. Information filtering can be done by using synopsis and Machine learning substance gathering methodologies. Neural substance classifier is used for representing summary of delivered messages and associated request. In light of content rendering, we have to check the sent messages are spam or not spam.
社交网络是分享、传递和分散数据的最突出的直观媒介之一。非正式组织是个体之间建立社会关系的阶段。客户可以通过交易不同类型的数据或信息与同伴保持联系。时不时地,个人发送的邮件会给客户带来类似于激怒或勒索的难题。邮件内容可能存在不考虑。像“敌意”、“厌恶”、“恶心”等术语都可以在邮件中找到。利用数据筛选将这些邮件识别为垃圾邮件。信息过滤可以通过使用摘要和机器学习物质收集方法来完成。神经物质分类器用于表示传递的消息和相关请求的摘要。根据内容呈现,我们必须检查发送的消息是否是垃圾邮件。
{"title":"A Novel Approach for Excavating Communication Using Taxonomy and Outline Mechanisms","authors":"A. Srinivas, S. Reddy","doi":"10.1109/ICIIP53038.2021.9702588","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702588","url":null,"abstract":"Social Network is a standout amongst the most prominent intuitive medium to share, impart and disperse data. Informal organization is the stage to manufacture social relations among individuals. Clients can stay in contact with companions by trading distinctive kinds of data or messages. Now and again individuals send mail which causes a difficult issue similar to irritating or extorting to clients. The mail substance might exist inconsiderate. The terminology like hostile, detest, disgusting and so on are accessible in the mail. Those mails are recognizing as spam utilizing data sifting. Information filtering can be done by using synopsis and Machine learning substance gathering methodologies. Neural substance classifier is used for representing summary of delivered messages and associated request. In light of content rendering, we have to check the sent messages are spam or not spam.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115282015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Face Recognition Framework for Real Time Monitoring 面向实时监控的多人脸识别框架
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702591
Vidit Kumar
From the past few years, face recognition has become critical for security and surveillance applications, and is now necessary in many different settings, including offices, educational institutions, airports, corporations, and social spaces. In this paper, we present a framework of multi-face recognition for real time monitoring, resulting in simultaneous face tracking and recognition. First, the faces are detected in the video frames by using viola-jones algorithm. To remove the outliers from the detected face region, we design a face skeleton based on YCBCR color space for further feature points detection and extraction. Then harris corner feature points and SURF feature points are detected from each face, where harris points are used to track the faces in the video and the SURF feature points are used to extract facial features from the cropped faces. As the face tracking is going on, faces are simultaneously recognized by the trained classifier (support vector machine). The experiments conducted on publicly available dataset suggest that our method is reliable, accurate, and robust that can be deployed for real-world multi-face recognition systems.
从过去几年开始,人脸识别已经成为安全和监控应用的关键,现在在许多不同的环境中都是必要的,包括办公室、教育机构、机场、公司和社交空间。本文提出了一种实时监控的多人脸识别框架,实现了人脸的同步跟踪和识别。首先,利用viola-jones算法对视频帧中的人脸进行检测。为了去除检测到的人脸区域中的异常点,我们设计了一个基于YCBCR颜色空间的人脸骨架,用于进一步的特征点检测和提取。然后从每个人脸中检测harris角特征点和SURF特征点,其中harris点用于跟踪视频中的人脸,SURF特征点用于从裁剪后的人脸中提取人脸特征。随着人脸跟踪的进行,人脸被训练好的分类器(支持向量机)同时识别。在公开可用的数据集上进行的实验表明,我们的方法是可靠、准确和鲁棒的,可以部署在现实世界的多人脸识别系统中。
{"title":"A Multi-Face Recognition Framework for Real Time Monitoring","authors":"Vidit Kumar","doi":"10.1109/ICIIP53038.2021.9702591","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702591","url":null,"abstract":"From the past few years, face recognition has become critical for security and surveillance applications, and is now necessary in many different settings, including offices, educational institutions, airports, corporations, and social spaces. In this paper, we present a framework of multi-face recognition for real time monitoring, resulting in simultaneous face tracking and recognition. First, the faces are detected in the video frames by using viola-jones algorithm. To remove the outliers from the detected face region, we design a face skeleton based on YCBCR color space for further feature points detection and extraction. Then harris corner feature points and SURF feature points are detected from each face, where harris points are used to track the faces in the video and the SURF feature points are used to extract facial features from the cropped faces. As the face tracking is going on, faces are simultaneously recognized by the trained classifier (support vector machine). The experiments conducted on publicly available dataset suggest that our method is reliable, accurate, and robust that can be deployed for real-world multi-face recognition systems.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copy Move Forgery Detection-A Robust Technique 复制移动伪造检测——一种鲁棒技术
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702623
Preeti Kale, Vijashree. A. More, U. Shinde
This paper discusses the Techniques for the Ro-bust Copy Move Forgery detection for the different datasets MICCF8multi,MICCF600,MICCF220,CoMoFoD DB. Thepro-posedmethodology computes two thresholds dynamically, for each input image one to detect the candidate block & another to detect the forged block. The performance of the proposed algorithm is evaluated along with the different state-of-art techniques. The results have shown that the proposed SWT-SVD algorithm out-performs 2D-DWT,BDF,YU-SUN,DRHFMS in terms of accuracy & computational time.
本文讨论了针对MICCF8multi、MICCF600、MICCF220、CoMoFoD DB等不同数据集的仿体复制移动伪造检测技术。该方法为每个输入图像动态计算两个阈值,一个用于检测候选块,另一个用于检测伪造块。该算法的性能与不同的最新技术一起进行了评估。结果表明,本文提出的SWT-SVD算法在精度和计算时间上都优于2D-DWT、BDF、YU-SUN、DRHFMS。
{"title":"Copy Move Forgery Detection-A Robust Technique","authors":"Preeti Kale, Vijashree. A. More, U. Shinde","doi":"10.1109/ICIIP53038.2021.9702623","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702623","url":null,"abstract":"This paper discusses the Techniques for the Ro-bust Copy Move Forgery detection for the different datasets MICCF8multi,MICCF600,MICCF220,CoMoFoD DB. Thepro-posedmethodology computes two thresholds dynamically, for each input image one to detect the candidate block & another to detect the forged block. The performance of the proposed algorithm is evaluated along with the different state-of-art techniques. The results have shown that the proposed SWT-SVD algorithm out-performs 2D-DWT,BDF,YU-SUN,DRHFMS in terms of accuracy & computational time.","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122075698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ML Based Hybrid Approach for COVID Disease Detection Using X-Ray Images 基于ML的基于x射线图像的COVID疾病检测混合方法
Pub Date : 2021-11-26 DOI: 10.1109/ICIIP53038.2021.9702570
P. Gupta, Anuj Gupta, Digvijay Puri
The COVID-19 epidemic has forced several organizations to undergo major shift, to examine essential aspects of their economic cycles and to make use of invention to maintain activities whilst maintaining a shifting rule scene and unique method. This review provides a comprehensive understanding via a framework of facts and an original approach of huge no of key issues and fundamental subtleties impacting organizations and society from COVID-19. The views for different welcoming industry professionals are analyzed and broken down when the specific interpretations may be understood Web learning, modern technology, man-made brainpower, data board, social communication, security of networks, information giant, blockchain, security, multi-faceted invention and approach from the present emergency standpoint and influence on such specific areas. The master perspectives give the extent of the elements optimum comprehension, distinguishing central questions and proposals for hypothesis and practice by utilizing chest X-Ray pictures with ML approach. In the paper, the use of these ML methods to cope with the COVID-19 pandemic flow situation is a promising aspect, just as the prevention of Covid infection model is proposed. Result shows the proposed hybrid approach gives better accuracy as compared to other
2019冠状病毒病疫情迫使一些组织进行重大转变,审查其经济周期的重要方面,并利用发明来维持活动,同时保持不断变化的规则场景和独特的方法。这篇综述通过事实框架和原创方法,提供了对COVID-19影响组织和社会的大量关键问题和基本微妙之处的全面理解。从当前应急的角度出发,对网络学习、现代技术、人工智能、数据板、社交通信、网络安全、信息巨头、区块链、安全、多方面的发明和方法以及对这些特定领域的影响等具体解读,分析和分解了不同欢迎行业专业人士的观点。主视角给出了元素的最佳理解程度,区分中心问题和建议的假设和实践,利用胸部x线照片与ML方法。在本文中,使用这些ML方法来应对Covid -19大流行的流量情况是一个有前景的方面,正如提出的预防Covid感染模型一样。结果表明,与其他方法相比,所提出的混合方法具有更好的精度
{"title":"ML Based Hybrid Approach for COVID Disease Detection Using X-Ray Images","authors":"P. Gupta, Anuj Gupta, Digvijay Puri","doi":"10.1109/ICIIP53038.2021.9702570","DOIUrl":"https://doi.org/10.1109/ICIIP53038.2021.9702570","url":null,"abstract":"The COVID-19 epidemic has forced several organizations to undergo major shift, to examine essential aspects of their economic cycles and to make use of invention to maintain activities whilst maintaining a shifting rule scene and unique method. This review provides a comprehensive understanding via a framework of facts and an original approach of huge no of key issues and fundamental subtleties impacting organizations and society from COVID-19. The views for different welcoming industry professionals are analyzed and broken down when the specific interpretations may be understood Web learning, modern technology, man-made brainpower, data board, social communication, security of networks, information giant, blockchain, security, multi-faceted invention and approach from the present emergency standpoint and influence on such specific areas. The master perspectives give the extent of the elements optimum comprehension, distinguishing central questions and proposals for hypothesis and practice by utilizing chest X-Ray pictures with ML approach. In the paper, the use of these ML methods to cope with the COVID-19 pandemic flow situation is a promising aspect, just as the prevention of Covid infection model is proposed. Result shows the proposed hybrid approach gives better accuracy as compared to other","PeriodicalId":431272,"journal":{"name":"2021 Sixth International Conference on Image Information Processing (ICIIP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122812282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 Sixth International Conference on Image Information Processing (ICIIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1