首页 > 最新文献

自主智能(英文)最新文献

英文 中文
Optimal DG allocation by Garra Rufa optimization for power loss reduction Garra Rufa优化DG分配以降低功率损耗
Pub Date : 2023-08-23 DOI: 10.32629/jai.v6i3.779
R. K. Chillab, M. Smida, Aqeel S. Jaber, A. Sakly
The rapid growth of distributed generation (DG) units has necessitated their optimization to address the increasing complexity of power grids and reduce power losses. The need for optimization of distributed generation (DG) units has been growing rapidly over the past few years. To minimize such losses, the optimal allocation of DG units needs to be correctly identified and applied. On the other hand, Garra Rufa optimization (GRO) is a mathematical optimization technique that is used to determine the high effective and efficient way to solve very complex problems to achieve optimal results. In this work, Garra Rufa optimization is used to identify the optimal placement and size of DG units in order to meet specific power loss requirements. A comparison between genetic algorithm (GA), particle swarm optimization (PSO), and GRO is done using MATLAB to validate the proposed method. The comparison shows that GRO is better than the other methods in DG allocation, especially in more than two DGs. The optimization techniques are evaluated using the IEEE standard power system case, specifically the 30-bus configuration.
分布式发电机组的快速发展要求对其进行优化,以应对日益复杂的电网并降低电力损耗。在过去的几年中,对分布式发电(DG)机组优化的需求迅速增长。为了尽量减少这种损失,需要正确地确定和应用DG单元的最佳分配。另一方面,格拉鲁法优化(GRO)是一种数学优化技术,用于确定解决非常复杂问题的高效方法,以达到最优结果。在这项工作中,采用Garra Rufa优化来确定DG单元的最佳位置和尺寸,以满足特定的功率损耗要求。利用MATLAB对遗传算法(GA)、粒子群优化(PSO)和GRO进行了比较,验证了所提方法的有效性。比较表明,GRO在DG分配中优于其他方法,特别是在两个以上DG分配中。使用IEEE标准电力系统案例对优化技术进行了评估,特别是30总线配置。
{"title":"Optimal DG allocation by Garra Rufa optimization for power loss reduction","authors":"R. K. Chillab, M. Smida, Aqeel S. Jaber, A. Sakly","doi":"10.32629/jai.v6i3.779","DOIUrl":"https://doi.org/10.32629/jai.v6i3.779","url":null,"abstract":"The rapid growth of distributed generation (DG) units has necessitated their optimization to address the increasing complexity of power grids and reduce power losses. The need for optimization of distributed generation (DG) units has been growing rapidly over the past few years. To minimize such losses, the optimal allocation of DG units needs to be correctly identified and applied. On the other hand, Garra Rufa optimization (GRO) is a mathematical optimization technique that is used to determine the high effective and efficient way to solve very complex problems to achieve optimal results. In this work, Garra Rufa optimization is used to identify the optimal placement and size of DG units in order to meet specific power loss requirements. A comparison between genetic algorithm (GA), particle swarm optimization (PSO), and GRO is done using MATLAB to validate the proposed method. The comparison shows that GRO is better than the other methods in DG allocation, especially in more than two DGs. The optimization techniques are evaluated using the IEEE standard power system case, specifically the 30-bus configuration.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48655361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterization of ink-based phantoms with deep networks and photoacoustic method 基于深度网络和光声方法的墨水体模表征
Pub Date : 2023-08-23 DOI: 10.32629/jai.v6i3.621
Hui Ling Chua, A. Huong, X. Ngu
This study aims to explore the feasibility of using an in-house developed photoacoustic (PA) system for predicting blood phantom concentrations using a pretrained Alexnet and a Long Short-Term Memory (LSTM) network. In two separate experiments, we investigate the performance of our strategy using a point laser source and a color-tunable Light-Emitting Diode (LED) as the illumination source. A single-point transducer is employed to measure signal change by adding ten different black ink concentrations into a tube. These PA signals are used for training and testing the employed deep networks. We found that the LED system with light wavelength of 450 nm gives the best characterization performance. The classification accuracy of the Alexnet and LSTM models tested on this dataset shows an average value of 94% and 96%, respectively, making this a preferred light wavelength for future operation. Our system may be used for the noninvasive assessment of microcirculatory changes in humans.
本研究旨在探索使用内部开发的光声(PA)系统,使用预训练的Alexnet和长短期记忆(LSTM)网络预测血液模型浓度的可行性。在两个单独的实验中,我们使用点激光源和颜色可调发光二极管(LED)作为照明源来研究我们的策略的性能。单点换能器用于通过将十种不同的黑色墨水浓度添加到管中来测量信号变化。这些PA信号用于训练和测试所使用的深度网络。我们发现,光波长为450nm的LED系统具有最佳的表征性能。在该数据集上测试的Alexnet和LSTM模型的分类精度分别显示出94%和96%的平均值,使其成为未来操作的首选波长。我们的系统可用于人类微循环变化的无创评估。
{"title":"Characterization of ink-based phantoms with deep networks and photoacoustic method","authors":"Hui Ling Chua, A. Huong, X. Ngu","doi":"10.32629/jai.v6i3.621","DOIUrl":"https://doi.org/10.32629/jai.v6i3.621","url":null,"abstract":"This study aims to explore the feasibility of using an in-house developed photoacoustic (PA) system for predicting blood phantom concentrations using a pretrained Alexnet and a Long Short-Term Memory (LSTM) network. In two separate experiments, we investigate the performance of our strategy using a point laser source and a color-tunable Light-Emitting Diode (LED) as the illumination source. A single-point transducer is employed to measure signal change by adding ten different black ink concentrations into a tube. These PA signals are used for training and testing the employed deep networks. We found that the LED system with light wavelength of 450 nm gives the best characterization performance. The classification accuracy of the Alexnet and LSTM models tested on this dataset shows an average value of 94% and 96%, respectively, making this a preferred light wavelength for future operation. Our system may be used for the noninvasive assessment of microcirculatory changes in humans.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49065963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel credit scoring system in financial institutions using artificial intelligence technology 一种基于人工智能技术的金融机构信用评分系统
Pub Date : 2023-08-22 DOI: 10.32629/jai.v6i2.824
Geethamanikanta Jakka, Amrutanshu Panigrahi, Abhilash Pati, M. N. Das, Jyotsnarani Tripathy
In order to evaluate a person’s or a company’s creditworthiness, financial institutions must use credit scoring. Traditional credit scoring algorithms frequently rely on manual and rule-based methods, which can be tedious and inaccurate. Recent developments in artificial intelligence (AI) technology have opened up possibilities for creating more reliable and effective credit rating systems. The data are pre-processed, including scaling using the 0–1 normalization method and resolving missing values by imputation. Information gain (IG), gain ratio (GR), and chi-square are three feature selection methodologies covered in the study. While GR normalizes IG by dividing it by the total entropy of the feature, IG quantifies the reduction in total entropy by adding a new feature. Based on chi-squared statistics, the most vital traits are determined using chi-square. This research employs different ML models to develop a hybrid model for credit score prediction. The ML algorithms support vector machine (SVM), neural networks (NNs), decision trees (DTs), random forest (RF), and logistic regression (LR) classifiers are employed here for experiments along with IG, GR, and chi-square feature selection methodologies for credit prediction over Australian and German datasets. The study offers an understanding of the decision-making process for informative characteristics and the functionality of machine learning (ML) in credit prediction tasks. The empirical analysis shows that in the case of the German dataset, the DT with GR feature selection and hyperparameter optimization outperforms SVM and NN with an accuracy of 99.78%. For the Australian dataset, SVM with GR feature selection outperforms NN and DT with an accuracy of 99.98%.
为了评估一个人或一家公司的信誉,金融机构必须使用信用评分。传统的信用评分算法经常依赖于手动和基于规则的方法,这可能是乏味和不准确的。人工智能技术的最新发展为创建更可靠、更有效的信用评级系统开辟了可能性。数据经过预处理,包括使用0–1归一化方法进行缩放和通过插补解决缺失值。信息增益(IG)、增益比(GR)和卡方是本研究涵盖的三种特征选择方法。GR通过将IG除以特征的总熵来归一化IG,而IG通过添加新特征来量化总熵的减少。基于卡方统计,最重要的特征是使用卡方来确定的。本研究采用不同的ML模型来开发信用评分预测的混合模型。ML算法支持向量机(SVM)、神经网络(NNs)、决策树(DTs)、随机森林(RF)和逻辑回归(LR)分类器与IG、GR和卡方特征选择方法一起用于澳大利亚和德国数据集上的信用预测实验。该研究提供了对信息特征的决策过程以及机器学习(ML)在信用预测任务中的功能的理解。实证分析表明,在德国数据集的情况下,具有GR特征选择和超参数优化的DT优于SVM和NN,准确率为99.78%。在澳大利亚数据集,带有GR特征选择的SVM优于NN和DT,准确率达99.98%。
{"title":"A novel credit scoring system in financial institutions using artificial intelligence technology","authors":"Geethamanikanta Jakka, Amrutanshu Panigrahi, Abhilash Pati, M. N. Das, Jyotsnarani Tripathy","doi":"10.32629/jai.v6i2.824","DOIUrl":"https://doi.org/10.32629/jai.v6i2.824","url":null,"abstract":"In order to evaluate a person’s or a company’s creditworthiness, financial institutions must use credit scoring. Traditional credit scoring algorithms frequently rely on manual and rule-based methods, which can be tedious and inaccurate. Recent developments in artificial intelligence (AI) technology have opened up possibilities for creating more reliable and effective credit rating systems. The data are pre-processed, including scaling using the 0–1 normalization method and resolving missing values by imputation. Information gain (IG), gain ratio (GR), and chi-square are three feature selection methodologies covered in the study. While GR normalizes IG by dividing it by the total entropy of the feature, IG quantifies the reduction in total entropy by adding a new feature. Based on chi-squared statistics, the most vital traits are determined using chi-square. This research employs different ML models to develop a hybrid model for credit score prediction. The ML algorithms support vector machine (SVM), neural networks (NNs), decision trees (DTs), random forest (RF), and logistic regression (LR) classifiers are employed here for experiments along with IG, GR, and chi-square feature selection methodologies for credit prediction over Australian and German datasets. The study offers an understanding of the decision-making process for informative characteristics and the functionality of machine learning (ML) in credit prediction tasks. The empirical analysis shows that in the case of the German dataset, the DT with GR feature selection and hyperparameter optimization outperforms SVM and NN with an accuracy of 99.78%. For the Australian dataset, SVM with GR feature selection outperforms NN and DT with an accuracy of 99.98%.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41735944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Future transportation computing model with trifold algorithm for real-time multipath networks 实时多路径网络未来交通计算模型的三重算法
Pub Date : 2023-08-22 DOI: 10.32629/jai.v6i2.618
Bharanidharan Chandrakasan, M. Subramanian, H. Manoharan, S. Selvarajan, Dr Rajanikanth Aluvalu
Purpose: In the past ten years, research on Intelligent Transportation Systems (ITS) has advanced tremendously in everyday situations to deliver improved performance for transport networks. To prevent problems with vehicular traffic, it is essential that alarm messages be sent on time. The truth is that an ITS system in and of itself could be a feature of a vehicular ad hoc network (VANET), which is a wireless network extension. As a result, a previously investigated path between two nodes might be destroyed over a short period of time. Design: The Time delay-based Multipath Routing (TMR) protocol is presented in this research which efficiently determines a route that is optimal for delivering packets to the target vehicle with the least amount of time delay. Using the TMR method, data flow is reduced, especially for daily communication. As a result, there are few packet retransmissions. Findings: To demonstrate how effective the suggested protocol is, several different protocols, including AOMDV, FF-AOMDV, EGSR, QMR, and ISR, have been used to evaluate the TMR. Simulation outcomes show how well our suggested approach performs when compared to alternative methods. Originality: Our method would accomplish two objectives as a consequence. First, it would increase the speed of data transmission, quickly transfer data packets to the target vehicle, especially warning messages, and prevent vehicular issues like automobile accidents. Second, to relieve network stress and minimize network congestion and data collisions.
目的:在过去的十年中,智能交通系统(ITS)的研究在日常生活中取得了巨大的进步,为交通网络提供了更好的性能。为了防止车辆交通出现问题,必须及时发送报警信息。事实是,ITS系统本身可能是车载自组织网络(VANET)的一个特征,这是一种无线网络扩展。因此,先前研究的两个节点之间的路径可能会在短时间内被破坏。设计:本研究提出了基于时间延迟的多路径路由(TMR)协议,该协议有效地确定了以最小的时间延迟将数据包发送到目标车辆的最佳路由。使用TMR方法可以减少数据流,特别是日常通信。因此,很少有数据包重传。研究结果:为了证明所建议的协议的有效性,使用了几种不同的协议,包括AOMDV、FF-AOMDV、EGSR、QMR和ISR来评估TMR。仿真结果表明,与其他方法相比,我们建议的方法执行得有多好。独创性:我们的方法最终将实现两个目标。首先,它将提高数据传输的速度,快速将数据包传输到目标车辆,特别是警告信息,防止汽车事故等车辆问题。第二,缓解网络压力,尽量减少网络拥塞和数据冲突。
{"title":"Future transportation computing model with trifold algorithm for real-time multipath networks","authors":"Bharanidharan Chandrakasan, M. Subramanian, H. Manoharan, S. Selvarajan, Dr Rajanikanth Aluvalu","doi":"10.32629/jai.v6i2.618","DOIUrl":"https://doi.org/10.32629/jai.v6i2.618","url":null,"abstract":"Purpose: In the past ten years, research on Intelligent Transportation Systems (ITS) has advanced tremendously in everyday situations to deliver improved performance for transport networks. To prevent problems with vehicular traffic, it is essential that alarm messages be sent on time. The truth is that an ITS system in and of itself could be a feature of a vehicular ad hoc network (VANET), which is a wireless network extension. As a result, a previously investigated path between two nodes might be destroyed over a short period of time. Design: The Time delay-based Multipath Routing (TMR) protocol is presented in this research which efficiently determines a route that is optimal for delivering packets to the target vehicle with the least amount of time delay. Using the TMR method, data flow is reduced, especially for daily communication. As a result, there are few packet retransmissions. Findings: To demonstrate how effective the suggested protocol is, several different protocols, including AOMDV, FF-AOMDV, EGSR, QMR, and ISR, have been used to evaluate the TMR. Simulation outcomes show how well our suggested approach performs when compared to alternative methods. Originality: Our method would accomplish two objectives as a consequence. First, it would increase the speed of data transmission, quickly transfer data packets to the target vehicle, especially warning messages, and prevent vehicular issues like automobile accidents. Second, to relieve network stress and minimize network congestion and data collisions.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44792850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indian sign language recognition and search results 印度手语识别和搜索结果
Pub Date : 2023-08-22 DOI: 10.32629/jai.v6i3.1000
S. Musale, Kalyani Gargate, Vaishnavi Gulavani, Samruddhi Kadam, S. Kothawade
Sign language is a medium of communication for people with hearing and speaking impairment. It uses gestures to convey messages. The proposed system focuses on using sign language in search engines and helping specially-abled people get the information they are looking for. Here, we are using Marathi sign language. Translation systems for Indian sign languages are not much simple and popular as American sign language. Marathi language consists of words with individual letters formed of two letter = Swara + Vyanjan (Mulakshar). Every Vyanjan or Swara individually has a unique sign which can be represented as image or video with still frames. Any letter formed of both Swara and Vyanjan is represented with hand gesture signing the Vyanjan as above and with movement of signed gesture in shape of Swara in Devnagari script. Such letters are represented with videos containing motion and frames in particular sequence. Further the predicted term can be searched on google using the sign search. The proposed system includes three important steps: 1) hand detection; 2) sign recognition using neural networks; 3) fetching search results. Overall, the system has great potential to help individuals with hearing and speaking impairment to access information on the internet through the use of sign language. It is a promising application of machine learning and deep learning techniques.
手语是有听力和语言障碍的人交流的媒介。它使用手势来传递信息。该系统的重点是在搜索引擎中使用手语,帮助残疾人获得他们正在寻找的信息。在这里,我们使用马拉地手语。印度手语的翻译系统不像美国手语那么简单和流行。马拉地语由两个字母组成的单词组成:Swara + Vyanjan (Mulakshar)。每个Vyanjan或Swara都有一个独特的标志,可以用静止帧的图像或视频表示。任何由Swara和Vyanjan组成的字母都是用手势来表示的,如上文所述,在Devnagari文字中,用手势来表示Swara的形状。这些字母用包含特定顺序的动作和帧的视频来表示。此外,可以使用符号搜索在谷歌上搜索预测项。该系统包括三个重要步骤:1)手部检测;2)基于神经网络的符号识别;3)获取搜索结果。总的来说,该系统具有很大的潜力,可以帮助有听力和语言障碍的人通过使用手语在互联网上获取信息。这是机器学习和深度学习技术的一个很有前途的应用。
{"title":"Indian sign language recognition and search results","authors":"S. Musale, Kalyani Gargate, Vaishnavi Gulavani, Samruddhi Kadam, S. Kothawade","doi":"10.32629/jai.v6i3.1000","DOIUrl":"https://doi.org/10.32629/jai.v6i3.1000","url":null,"abstract":"Sign language is a medium of communication for people with hearing and speaking impairment. It uses gestures to convey messages. The proposed system focuses on using sign language in search engines and helping specially-abled people get the information they are looking for. Here, we are using Marathi sign language. Translation systems for Indian sign languages are not much simple and popular as American sign language. Marathi language consists of words with individual letters formed of two letter = Swara + Vyanjan (Mulakshar). Every Vyanjan or Swara individually has a unique sign which can be represented as image or video with still frames. Any letter formed of both Swara and Vyanjan is represented with hand gesture signing the Vyanjan as above and with movement of signed gesture in shape of Swara in Devnagari script. Such letters are represented with videos containing motion and frames in particular sequence. Further the predicted term can be searched on google using the sign search. The proposed system includes three important steps: 1) hand detection; 2) sign recognition using neural networks; 3) fetching search results. Overall, the system has great potential to help individuals with hearing and speaking impairment to access information on the internet through the use of sign language. It is a promising application of machine learning and deep learning techniques.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47006751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of various global maximum power point tracking techniques for fuel cell frameworks 燃料电池框架各种全局最大功率点跟踪技术的比较分析
Pub Date : 2023-08-18 DOI: 10.32629/jai.v6i2.703
Mohammad Junaid Khan, Rashid Mustafa, Pushparaj Pal
The efficiency and performance of fuel cell (FC) systems heavily rely on their ability to track the maximum power point (MPP) of the FC stack. This research article presents a comprehensive review and comparative analysis of various global maximum power point tracking (GMPPT) techniques developed for FC systems. These techniques aim to optimize power extraction from FCs, enhance system efficiency, and improve overall performance. Through a detailed investigation and evaluation of different GMPPT methods, this study sheds light on the advancements made in this field, identifies key challenges, and provides recommendations for future research directions. The findings of this research contribute to the development of more efficient and reliable FC systems for diverse applications.
燃料电池(FC)系统的效率和性能在很大程度上依赖于其跟踪FC堆栈最大功率点(MPP)的能力。这篇研究文章提出了一个全面的审查和比较分析各种全球最大功率点跟踪(GMPPT)技术开发的FC系统。这些技术旨在优化fc的功率提取,提高系统效率,并改善整体性能。通过对不同GMPPT方法的详细调查和评估,本研究揭示了该领域的进展,确定了关键挑战,并为未来的研究方向提出了建议。本研究的结果有助于开发更高效、更可靠的FC系统,用于各种应用。
{"title":"Comparative analysis of various global maximum power point tracking techniques for fuel cell frameworks","authors":"Mohammad Junaid Khan, Rashid Mustafa, Pushparaj Pal","doi":"10.32629/jai.v6i2.703","DOIUrl":"https://doi.org/10.32629/jai.v6i2.703","url":null,"abstract":"The efficiency and performance of fuel cell (FC) systems heavily rely on their ability to track the maximum power point (MPP) of the FC stack. This research article presents a comprehensive review and comparative analysis of various global maximum power point tracking (GMPPT) techniques developed for FC systems. These techniques aim to optimize power extraction from FCs, enhance system efficiency, and improve overall performance. Through a detailed investigation and evaluation of different GMPPT methods, this study sheds light on the advancements made in this field, identifies key challenges, and provides recommendations for future research directions. The findings of this research contribute to the development of more efficient and reliable FC systems for diverse applications.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69961177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure transmission of grayscale images with triggered error visual sharing 通过触发错误视觉共享实现灰度图像的安全传输
Pub Date : 2023-08-17 DOI: 10.32629/jai.v6i2.957
John Blesswin, S. Mary, Shubhangi Suryawanshi, Vanita G. Kshirsagar, Sarika Y. Pabalkar, Mithra Venkatesan, Catherine Esther Karunya
In the digital era, data transfer plays a crucial role in various industries such as banking, healthcare, marketing, and social media. Images are widely used as a means of communication. The presence of cyber attackers poses a significant risk to data integrity and security during transmission. According to the cost of data breach report 2021, the healthcare industry has experienced the highest costs associated with data breaches, highlighting the need for robust security measures. Visual cryptography (VC) is a technique used to secure image data during transmission. It involves encrypting the image and dividing it into shares, which are then communicated to the intended recipients. Each individual share does not reveal any classified information. At the destination, the shares are digitally combined to reconstruct the original image. When implementing VC, several factors need to be considered, including security, computational complexity, and the quality of the reconstructed image. In this paper, a new method called progressive meaningful visual cryptography (PMVC) is proposed for transferring secret images. The PMVC method introduces an error instance that triggers meaningful shares generation. The proposed method ensures the quality of the reconstructed image by achieving a peak signal-to-noise ratio (PSNR) of up to 37 dB.
在数字时代,数据传输在银行、医疗保健、营销和社交媒体等各个行业发挥着至关重要的作用。图像被广泛用作一种交流手段。网络攻击者的存在对传输过程中的数据完整性和安全性构成了重大风险。根据2021年数据泄露成本报告,医疗保健行业经历了与数据泄露相关的最高成本,这突出了采取强有力的安全措施的必要性。视觉密码学(VC)是一种用于在传输过程中保护图像数据的技术。它包括对图像进行加密并将其划分为多个共享,然后将这些共享传递给预定的接收者。每个单独的共享不会透露任何机密信息。在目的地,共享被数字组合以重建原始图像。在实现VC时,需要考虑几个因素,包括安全性、计算复杂性和重建图像的质量。本文提出了一种新的传输秘密图像的方法,称为渐进有意义视觉密码学(PMVC)。PMVC方法引入了一个错误实例,该实例触发有意义的共享生成。所提出的方法通过实现高达37dB的峰值信噪比(PSNR)来确保重建图像的质量。
{"title":"Secure transmission of grayscale images with triggered error visual sharing","authors":"John Blesswin, S. Mary, Shubhangi Suryawanshi, Vanita G. Kshirsagar, Sarika Y. Pabalkar, Mithra Venkatesan, Catherine Esther Karunya","doi":"10.32629/jai.v6i2.957","DOIUrl":"https://doi.org/10.32629/jai.v6i2.957","url":null,"abstract":"In the digital era, data transfer plays a crucial role in various industries such as banking, healthcare, marketing, and social media. Images are widely used as a means of communication. The presence of cyber attackers poses a significant risk to data integrity and security during transmission. According to the cost of data breach report 2021, the healthcare industry has experienced the highest costs associated with data breaches, highlighting the need for robust security measures. Visual cryptography (VC) is a technique used to secure image data during transmission. It involves encrypting the image and dividing it into shares, which are then communicated to the intended recipients. Each individual share does not reveal any classified information. At the destination, the shares are digitally combined to reconstruct the original image. When implementing VC, several factors need to be considered, including security, computational complexity, and the quality of the reconstructed image. In this paper, a new method called progressive meaningful visual cryptography (PMVC) is proposed for transferring secret images. The PMVC method introduces an error instance that triggers meaningful shares generation. The proposed method ensures the quality of the reconstructed image by achieving a peak signal-to-noise ratio (PSNR) of up to 37 dB.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47141490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An extensive study of facial expression recognition using artificial intelligence techniques with different datasets 使用不同数据集的人工智能技术进行面部表情识别的广泛研究
Pub Date : 2023-08-15 DOI: 10.32629/jai.v6i2.631
Sridhar Reddy Karra, Arun L. Kakhandki
Machine and deep learning (DL) algorithms have advanced to a point where a wide range of crucial real-world computer vision problems can be solved. Facial Expression Recognition (FER) is one of these applications; it is the foremost non-verbal intentions and a fascinating study of symmetry. A prevalent application of deep learning has become the area of vision, where facial expression recognition has emerged as one of the most promising new frontiers. Latterly deep learning-based FER models have been plagued by technical problems, including under-fitting and over-fitting. Probably inadequate information is used for training and expressing ideas. With these considerations in mind, this article gives a systematic and complete survey of the most cutting-edge AI strategies and gives a conclusion to address the aforementioned problems. It is also a scheme of classification for existing facial proposals in compact. This survey analyses the structure of the usual FER method and discusses the feasible technologies that may be used in its respective elements. In addition, this study provides a summary of seventeen widely-used FER datasets that reviews functioning novel machine and DL networks suggested by academics and outline their benefits and liability in the context of facial expression acknowledgment based on static replicas. Finally, this study discusses the research obstacles and open consequences of that well-conditioned face expression recognition scheme.
机器和深度学习(DL)算法已经发展到可以解决一系列关键的现实世界计算机视觉问题的地步。面部表情识别(FER)就是其中的一个应用;它是最重要的非语言意图,也是对对称性的一项引人入胜的研究。深度学习的一个普遍应用已经成为视觉领域,面部表情识别已经成为最有前途的新领域之一。后期基于深度学习的FER模型一直受到技术问题的困扰,包括欠拟合和过拟合。可能没有足够的信息用于培训和表达想法。考虑到这些考虑,本文对最前沿的人工智能策略进行了系统、完整的调查,并得出了解决上述问题的结论。这也是紧凑型中现有面部建议的分类方案。本调查分析了常用FER方法的结构,并讨论了可用于其各个元素的可行技术。此外,本研究总结了17个广泛使用的FER数据集,回顾了学术界提出的功能新颖的机器和DL网络,并概述了它们在基于静态复制的面部表情识别中的优势和责任。最后,本研究讨论了条件良好的人脸表情识别方案的研究障碍和开放性后果。
{"title":"An extensive study of facial expression recognition using artificial intelligence techniques with different datasets","authors":"Sridhar Reddy Karra, Arun L. Kakhandki","doi":"10.32629/jai.v6i2.631","DOIUrl":"https://doi.org/10.32629/jai.v6i2.631","url":null,"abstract":"Machine and deep learning (DL) algorithms have advanced to a point where a wide range of crucial real-world computer vision problems can be solved. Facial Expression Recognition (FER) is one of these applications; it is the foremost non-verbal intentions and a fascinating study of symmetry. A prevalent application of deep learning has become the area of vision, where facial expression recognition has emerged as one of the most promising new frontiers. Latterly deep learning-based FER models have been plagued by technical problems, including under-fitting and over-fitting. Probably inadequate information is used for training and expressing ideas. With these considerations in mind, this article gives a systematic and complete survey of the most cutting-edge AI strategies and gives a conclusion to address the aforementioned problems. It is also a scheme of classification for existing facial proposals in compact. This survey analyses the structure of the usual FER method and discusses the feasible technologies that may be used in its respective elements. In addition, this study provides a summary of seventeen widely-used FER datasets that reviews functioning novel machine and DL networks suggested by academics and outline their benefits and liability in the context of facial expression acknowledgment based on static replicas. Finally, this study discusses the research obstacles and open consequences of that well-conditioned face expression recognition scheme.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41915872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blended learning pedagogy and its implementation in the tertiary education: Bangladesh perspectives 混合学习教学法及其在高等教育中的实施:孟加拉国视角
Pub Date : 2023-08-15 DOI: 10.32629/jai.v6i2.744
Shrabonti Mitra, MD. Abdul Malek, Tanzin Sultana, Abhijit Pathak, Md. Jainal Abedin, Khadizatul Kobra, Md. Habib Ullah, Mayeen Uddin Khandaker
This paper reviews the theoretical foundations and components of blended learning (BL) in higher education globally, analyzing six articles from five countries published between January 2016 and December 2020. The study identified challenges faced by instructors, including workload, timeliness, and lack of academic and technical skills to manage BL. Balancing face-to-face and online learning was also challenging. To address these issues, the importance of staff training, support, and networking was emphasized, proposing a modified BL model for tertiary education in Bangladesh, which could be implemented post-pandemic using a machine-learning approach. The mixed BL model was recommended for Bangladeshi institutions, utilizing machine learning algorithms to facilitate outcome-based learning through technological applications. A preliminary survey of 120 students from BGC Trust University in Bangladesh was conducted using statistical data obtained from machine learning algorithms to explore the applicability of the mixed-learning approach. Machine learning proved beneficial for data analysis, drawing valuable insights for educators and policymakers seeking effective teaching strategies that incorporate technology. This research underscores the potential of machine learning in conducting surveys and analyzing data related to blended learning in tertiary education, offering significant contributions to the field.
本文回顾了全球高等教育混合学习的理论基础和组成部分,分析了2016年1月至2020年12月期间来自五个国家发表的六篇文章。该研究确定了教师面临的挑战,包括工作量、及时性、缺乏管理BL的学术和技术技能。平衡面对面和在线学习也很有挑战性。为了解决这些问题,强调了工作人员培训、支持和联网的重要性,提出了一种改进的孟加拉国高等教育BL模式,可在大流行后使用机器学习方法实施。混合BL模型被推荐给孟加拉国的机构,利用机器学习算法通过技术应用促进基于结果的学习。对孟加拉国BGC信托大学的120名学生进行了初步调查,使用从机器学习算法中获得的统计数据来探索混合学习方法的适用性。事实证明,机器学习有利于数据分析,为寻求结合技术的有效教学策略的教育工作者和政策制定者提供了有价值的见解。这项研究强调了机器学习在进行调查和分析高等教育混合学习相关数据方面的潜力,为该领域做出了重大贡献。
{"title":"Blended learning pedagogy and its implementation in the tertiary education: Bangladesh perspectives","authors":"Shrabonti Mitra, MD. Abdul Malek, Tanzin Sultana, Abhijit Pathak, Md. Jainal Abedin, Khadizatul Kobra, Md. Habib Ullah, Mayeen Uddin Khandaker","doi":"10.32629/jai.v6i2.744","DOIUrl":"https://doi.org/10.32629/jai.v6i2.744","url":null,"abstract":"This paper reviews the theoretical foundations and components of blended learning (BL) in higher education globally, analyzing six articles from five countries published between January 2016 and December 2020. The study identified challenges faced by instructors, including workload, timeliness, and lack of academic and technical skills to manage BL. Balancing face-to-face and online learning was also challenging. To address these issues, the importance of staff training, support, and networking was emphasized, proposing a modified BL model for tertiary education in Bangladesh, which could be implemented post-pandemic using a machine-learning approach. The mixed BL model was recommended for Bangladeshi institutions, utilizing machine learning algorithms to facilitate outcome-based learning through technological applications. A preliminary survey of 120 students from BGC Trust University in Bangladesh was conducted using statistical data obtained from machine learning algorithms to explore the applicability of the mixed-learning approach. Machine learning proved beneficial for data analysis, drawing valuable insights for educators and policymakers seeking effective teaching strategies that incorporate technology. This research underscores the potential of machine learning in conducting surveys and analyzing data related to blended learning in tertiary education, offering significant contributions to the field.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45979720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HDevChaRNet: A deep learning-based model for recognizing offline handwritten devanagari characters HDevChaRNet:一个基于深度学习的离线手写德文字符识别模型
Pub Date : 2023-08-15 DOI: 10.32629/jai.v6i2.679
Bharati Yadav, Ajay Indian, Gaurav Meena
Optical character recognition (OCR) converts text images into machine-readable text. Due to the non-availability of several standard datasets of Devanagari characters, researchers have used many techniques for developing an OCR system with varying recognition rates using their own created datasets. The main objective of our proposed study is to improve the recognition rate by analyzing the effect of using batch normalization (BN) instead of dropout in convolutional neural network (CNN) architecture. So, a CNN-based model HDevChaRNet (Handwritten Devanagari Character Recognition Network) is proposed in this study for same to recognize offline handwritten Devanagari characters using a dataset named Devanagari handwritten character dataset (DHCD). DHCD comprises a total of 46 classes of characters, out of which 36 are consonants, and 10 are numerals. The proposed models based on convolutional neural network (CNN) with BN for recognizing the Devanagari characters showed an improved accuracy of 98.75%, 99.70%, and 99.17% for 36, 10, and 46 classes, respectively.
光学字符识别(OCR)将文本图像转换为机器可读文本。由于无法获得几个天成文书字符的标准数据集,研究人员使用了许多技术,使用自己创建的数据集开发了具有不同识别率的OCR系统。我们提出的研究的主要目的是通过分析在卷积神经网络(CNN)架构中使用批量归一化(BN)而不是丢弃的效果来提高识别率。因此,本研究提出了一个基于CNN的模型HDevChaRNet(手写天成文书字符识别网络),用于使用名为Devanagari手写字符数据集(DHCD)的数据集来识别离线手写天成文书。DHCD总共包括46类字符,其中36类是辅音,10类是数字。所提出的基于卷积神经网络(CNN)和BN的模型用于识别天成文书(Devanagari)字符,对36类、10类和46类的准确率分别提高了98.75%、99.70%和99.17%。
{"title":"HDevChaRNet: A deep learning-based model for recognizing offline handwritten devanagari characters","authors":"Bharati Yadav, Ajay Indian, Gaurav Meena","doi":"10.32629/jai.v6i2.679","DOIUrl":"https://doi.org/10.32629/jai.v6i2.679","url":null,"abstract":"Optical character recognition (OCR) converts text images into machine-readable text. Due to the non-availability of several standard datasets of Devanagari characters, researchers have used many techniques for developing an OCR system with varying recognition rates using their own created datasets. The main objective of our proposed study is to improve the recognition rate by analyzing the effect of using batch normalization (BN) instead of dropout in convolutional neural network (CNN) architecture. So, a CNN-based model HDevChaRNet (Handwritten Devanagari Character Recognition Network) is proposed in this study for same to recognize offline handwritten Devanagari characters using a dataset named Devanagari handwritten character dataset (DHCD). DHCD comprises a total of 46 classes of characters, out of which 36 are consonants, and 10 are numerals. The proposed models based on convolutional neural network (CNN) with BN for recognizing the Devanagari characters showed an improved accuracy of 98.75%, 99.70%, and 99.17% for 36, 10, and 46 classes, respectively.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43334757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
自主智能(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1