Global Transitions Proceedings最新文献

筛选
英文 中文
International Conference on Intelligent Engineering Approach (ICIEA-2022), 12th February 2022, H.K.E. Society's S.L.N. College of Engineering, Raichur, Karnataka, India 智能工程方法国际会议(ICIEA-2022), 2022年2月12日,印度卡纳塔克邦Raichur, hke.society 's S.L.N.工程学院
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.026
{"title":"International Conference on Intelligent Engineering Approach (ICIEA-2022), 12th February 2022, H.K.E. Society's S.L.N. College of Engineering, Raichur, Karnataka, India","authors":"","doi":"10.1016/j.gltp.2022.04.026","DOIUrl":"10.1016/j.gltp.2022.04.026","url":null,"abstract":"","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Page 1"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000620/pdfft?md5=c6ba2f413493ca6a9f8bf38c6c5e9687&pid=1-s2.0-S2666285X22000620-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78213715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN based multi-view classification and ROI segmentation: A survey 基于CNN的多视图分类和ROI分割研究综述
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.019
Rashmi S, Chandrakala B M, Divya M. Ramani, Megha S. Harsur
{"title":"CNN based multi-view classification and ROI segmentation: A survey","authors":"Rashmi S,&nbsp;Chandrakala B M,&nbsp;Divya M. Ramani,&nbsp;Megha S. Harsur","doi":"10.1016/j.gltp.2022.04.019","DOIUrl":"10.1016/j.gltp.2022.04.019","url":null,"abstract":"<div><p>In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000553/pdfft?md5=e6c4d48f52e2faf41f0555f1258a2aa2&pid=1-s2.0-S2666285X22000553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78594383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysing corpus of office documents for macro-based attacks using Machine Learning 使用机器学习分析基于宏的攻击的办公文档语料库
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.004
V Ravi, S.P. Gururaj, H.K. Vedamurthy, M.B. Nirmala
{"title":"Analysing corpus of office documents for macro-based attacks using Machine Learning","authors":"V Ravi,&nbsp;S.P. Gururaj,&nbsp;H.K. Vedamurthy,&nbsp;M.B. Nirmala","doi":"10.1016/j.gltp.2022.04.004","DOIUrl":"10.1016/j.gltp.2022.04.004","url":null,"abstract":"<div><p>Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called <em>Obfuscated-Word2vec</em> is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000401/pdfft?md5=e7b876b452a7172444358a89eb62dde6&pid=1-s2.0-S2666285X22000401-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76899586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reconfigurable fractal microstrip antenna with varactor diode 可重构变容二极管分形微带天线
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.007
Madhusudhana K , Shriram P Hegde
{"title":"Reconfigurable fractal microstrip antenna with varactor diode","authors":"Madhusudhana K ,&nbsp;Shriram P Hegde","doi":"10.1016/j.gltp.2022.03.007","DOIUrl":"10.1016/j.gltp.2022.03.007","url":null,"abstract":"<div><p>In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant <em>ε<sub>r</sub></em> = 4<em>.</em>4) substrate with dimension (41 × 41 × 1.6) mm<sup>3</sup>. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 183-189"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000127/pdfft?md5=f3ace4dc2f3218d9f7d6b293aa2c9a99&pid=1-s2.0-S2666285X22000127-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81173951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QCA: A survey and design of logic circuits QCA:逻辑电路的综述与设计
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.012
Smita C. Chetti , Omkar Yatgal
{"title":"QCA: A survey and design of logic circuits","authors":"Smita C. Chetti ,&nbsp;Omkar Yatgal","doi":"10.1016/j.gltp.2022.04.012","DOIUrl":"10.1016/j.gltp.2022.04.012","url":null,"abstract":"<div><p>Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 142-148"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000486/pdfft?md5=8bb8b9d84756c5c42234f294b4d9c46e&pid=1-s2.0-S2666285X22000486-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80244402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhancing for cluster head selection using fuzzy logic in wireless sensor network 基于模糊逻辑的无线传感器网络簇头选择改进
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.011
Sujatha J. , Geetha N. , Jyothi N. , Vishwanath P.
{"title":"An enhancing for cluster head selection using fuzzy logic in wireless sensor network","authors":"Sujatha J. ,&nbsp;Geetha N. ,&nbsp;Jyothi N. ,&nbsp;Vishwanath P.","doi":"10.1016/j.gltp.2022.03.011","DOIUrl":"10.1016/j.gltp.2022.03.011","url":null,"abstract":"<div><p>Extending lifetime for far off sensor coordinate through immaterial human perception is unreasonable. To comprehend this concern assorted researchers come up through assembly methodology which preserve construct up a far-off sensor put together extra adaptable, prolonged life time, proficient imperativeness. Nevertheless, an imposing part of planned computations overstuff the congregation chief in midst of pack diversion plan. Front attitude such a circumstance, proposal of fluffy analysis is superior the circumstance essential authority in distant sensor systematize. Fleecy reasoning is lesion up being additional usual for heap dispersion amongst sensor center points at last extending structure lifetime. Here Type2 fleecy reasoning is planned which handles uncertain level decisions enhanced than sort feathery reasoning. For the most part here essentialness smoothing out provoking extend structure lifetime using gather is cultivated. Likewise, the proposed fleecy reasoning which picks the gathering head just as show how organize life span can be stretched out close via immaterial cluster adversity in the midst of transmission process. Various computation as well as the connected structure lifetime is in like manner showed up through feathery analysis mounting most outrageous structure lifetime appeared differently in relation to other people.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 202-207"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000164/pdfft?md5=36d6de5a26ab71091fea86ca9afdec8b&pid=1-s2.0-S2666285X22000164-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82964498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting the survival rate of breast cancer patients using a supervised learning method 使用监督学习方法预测乳腺癌患者的生存率
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.005
Shweta S. Kaddi , Malini M. Patil
{"title":"Forecasting the survival rate of breast cancer patients using a supervised learning method","authors":"Shweta S. Kaddi ,&nbsp;Malini M. Patil","doi":"10.1016/j.gltp.2022.04.005","DOIUrl":"10.1016/j.gltp.2022.04.005","url":null,"abstract":"<div><p>The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 25-30"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000413/pdfft?md5=2c95660b423c6ed5ccd81c4cd695b04c&pid=1-s2.0-S2666285X22000413-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84207646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ooly instant logistics 奥利即时物流
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.002
Qazi Amaan, Satyam Priyam, Rohan Veerapaneni, Sudha Guru Priyanka, Vinodha K
{"title":"Ooly instant logistics","authors":"Qazi Amaan,&nbsp;Satyam Priyam,&nbsp;Rohan Veerapaneni,&nbsp;Sudha Guru Priyanka,&nbsp;Vinodha K","doi":"10.1016/j.gltp.2022.04.002","DOIUrl":"10.1016/j.gltp.2022.04.002","url":null,"abstract":"<div><p>Consumers prefer to order from apps/websites at their ease. The existing solutions have affected the local vendors by providing this ease to the customers. The authors have made a working O2O, B2B logistics system and a deployed web platform ready to deliver products at consumer's ease and provide an online presence for the vendors. OOLY is the proposed model that has remodelled the way people order, transfer items, and move by providing an online presence to the vendors. This review has proved that the Customers get local support from local vendors since the customer knows the shop/vendor. Findings have shown that the Local vendors with an online presence provide the trust for customers and transfer items at ease. The products get replaced at ease without the long existent processes. Authors have succeeded by providing an online presence for vendors and have improved customer satisfaction.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 8-12"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000383/pdfft?md5=ef4694db97367dad247b35cc1cc4976b&pid=1-s2.0-S2666285X22000383-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78427154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication 基于离散小波变换和Alpha混合的图像隐写性能分析
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.024
Saleem S Tevaramani , Ravi J
{"title":"Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication","authors":"Saleem S Tevaramani ,&nbsp;Ravi J","doi":"10.1016/j.gltp.2022.03.024","DOIUrl":"10.1016/j.gltp.2022.03.024","url":null,"abstract":"<div><p>The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 208-214"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000309/pdfft?md5=66c93e7a2b156d6244b62ffa00cfb781&pid=1-s2.0-S2666285X22000309-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80650118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms 基于人工智能和监督机器学习算法的云计算环境智能风险评估方法建模
Global Transitions Proceedings Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.030
Abhishek Sharma, Umesh Kumar Singh
{"title":"Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms","authors":"Abhishek Sharma,&nbsp;Umesh Kumar Singh","doi":"10.1016/j.gltp.2022.03.030","DOIUrl":"10.1016/j.gltp.2022.03.030","url":null,"abstract":"<div><p>Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing &amp; hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 243-250"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200036X/pdfft?md5=da30c7c469672403b680e1e34ac54ba2&pid=1-s2.0-S2666285X2200036X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81997939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信