Proceedings of the 2nd International Conference on Computing Advancements最新文献

筛选
英文 中文
Machine Learning Method Based Industrial Risk Analysis and Prediction 基于机器学习方法的工业风险分析与预测
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3543003
Salim Khan, F. Hasan, M. O. Faruk, Anayet Ullah, Mohammad Woli Ullah, Abdul Gafur
{"title":"Machine Learning Method Based Industrial Risk Analysis and Prediction","authors":"Salim Khan, F. Hasan, M. O. Faruk, Anayet Ullah, Mohammad Woli Ullah, Abdul Gafur","doi":"10.1145/3542954.3543003","DOIUrl":"https://doi.org/10.1145/3542954.3543003","url":null,"abstract":"IoT-based technologies growing all over the world. After the industrial revolution, machines and robots gradually replaced human effort. In the absence of the human brain-machine and robots makes an error. In this paper, a plan was developed to get out of this situation that works not only efficiently but also thinks like humans. In this system, the machine will learn based on the situation that has been made by any occurrence. In this work Raspberry Pi-based system helps to make a proper analysis of the machines. Voltage, current, gas value, and temperate values are taken as input parameters. Machine learning matches/compares these real-time sensor data with training data (which is used to train the system). As a result, The machine learning module provides some statistics graphs of sensor data. Machine performance can analyze by observing these graphs. Also, determine the efficiency and predict the possibility of upcoming threats or risks.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Constructive Review on Pedestrian Action Detection, Recognition and Prediction 行人动作检测、识别与预测研究综述
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3543007
Md. Akib Shahriar Khan, Md Jannatul Baki Showmik, Tanvir Ahmed, A. Saif
{"title":"A Constructive Review on Pedestrian Action Detection, Recognition and Prediction","authors":"Md. Akib Shahriar Khan, Md Jannatul Baki Showmik, Tanvir Ahmed, A. Saif","doi":"10.1145/3542954.3543007","DOIUrl":"https://doi.org/10.1145/3542954.3543007","url":null,"abstract":"Analysis of pedestrian activities in the video sequences is an intriguing domain that incorporates vast applications, such as autonomous driving systems, traffic control systems and interactions between people and computers. The primary focus of this research was on evaluating several strategies to analyse pedestrian activities effectively. The constructive comparison included three main steps, i.e. detection of the pedestrian, recognition of their actions and prediction about the activity of the pedestrian. Changes in activities of pedestrians, dynamic background, moving camera, view angle and processing time made it more challenging. Recent approaches were justified and compared based on precision accuracy, processing time and minimum resource allocation. The results were also compared by a series of state-of-the-art research datasets with provided significant observations in terms of greater accuracy which can lead to the construction of an extremely improvised system that would save pedestrian people from road accidents and assist autonomous driving systems. The purpose of this study is to discuss the current progress using different approaches.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Possible Side Effects after Getting COVID-19 Vaccine Based on Pre-Existing Disease: Asthma: Analysis of Side Effects after using Moderna, Pfizer and Janssen Vaccine Based on VAERS Dataset 基于已有疾病接种COVID-19疫苗后可能出现的副作用:哮喘:基于VAERS数据集的Moderna、辉瑞和杨森疫苗的副作用分析
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3543001
Md Musleh Uddin Hasan, M. Hossain, M. Hossain, K. I. Rushee
{"title":"Possible Side Effects after Getting COVID-19 Vaccine Based on Pre-Existing Disease: Asthma: Analysis of Side Effects after using Moderna, Pfizer and Janssen Vaccine Based on VAERS Dataset","authors":"Md Musleh Uddin Hasan, M. Hossain, M. Hossain, K. I. Rushee","doi":"10.1145/3542954.3543001","DOIUrl":"https://doi.org/10.1145/3542954.3543001","url":null,"abstract":"Vaccination could be a critical preventative strategy against coronavirus disease 2019 (COVID-19), and it is essential to understand the vaccine's usability in the general population. A safe and effective vaccination is the most effective way to terminate this epidemic. Many communities throughout the globe have expressed concerns regarding the efficacy and side effects of coronavirus SARS CoV2 vaccinations. Vaccines are now being rushed to market. Many papers have been published on COVID-19 vaccine, hesitancy, acceptance rate, local survey, vaccine distribution, vaccine information, etc. However, none of them mentioned any potential side effects from the COVID-19 vaccination for those with pre-existing disease like Asthma. The study aimed to describe the possible side effects after getting COVID-19 vaccines (Moderna, Pfizer and Janssen) for those who have a pre-existing disease like Asthma.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of Mobile Edge Computing in Vehicle Platooning 车辆队列中移动边缘计算的概述
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3542975
Tareq Md Rabiul Hossain Chy, Nushrat Jahan
{"title":"An overview of Mobile Edge Computing in Vehicle Platooning","authors":"Tareq Md Rabiul Hossain Chy, Nushrat Jahan","doi":"10.1145/3542954.3542975","DOIUrl":"https://doi.org/10.1145/3542954.3542975","url":null,"abstract":"Due to a vehicle terminal’s limited computing capacity against cloud computing, it is quite hard to meet the needs of certain services and applications, mainly for intensive types of computation, resulting in increased computation burden and delay, as well as increased energy consumption. MEC (Mobile Edge Computing) is a up to date architecture which extends the processing and the storage services to the network’s edge. It’s a cutting-edge technology that can serve many devices and services with ultra-low latency. For vehicle platooning a task offloading is analyzed in this paper.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129669714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Website Detection using Deep Learning 使用深度学习的网络钓鱼网站检测
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3542967
Md. Abubakar Siddiq, Md. Arifuzzaman, M. S. Islam
{"title":"Phishing Website Detection using Deep Learning","authors":"Md. Abubakar Siddiq, Md. Arifuzzaman, M. S. Islam","doi":"10.1145/3542954.3542967","DOIUrl":"https://doi.org/10.1145/3542954.3542967","url":null,"abstract":"Phishing attack is a type of cyber-attack where attacker sends fraudulent (spoofed, fake or deceptive) messages designed to lure a human victim to give away personal information or credentials or to deploy malicious software in victim's infrastructure like ransomware. As Internet usage is increasing day by day so are the cyber-crimes and scams. Phishing is one of the latest sophisticated techniques used by the scammers. Phishing website detection can help the users to avoid falling victim to these attacks. Although phishing websites are disguised as a legitimate one, fortunately they have some identifiable features. We have proposed a supervised learning approach using deep learning algorithms to detect phishing websites. We have achieved 94.8% accuracy using standard neural network model and achieved 93.6% accuracy with CNN (Conv2D) model. We have used a dataset downloaded from University of California, Irvine machine learning repository.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124310178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Enhanced CNN Model For Classifying Skin Cancer 一种用于皮肤癌分类的增强CNN模型
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3543019
Kazi Md Minhajul Haider, Mondira Dhar, Fahima Akter, Sadia Islam, Syed Ragib Shariar, Muhammad Iqbal Hossain
{"title":"An Enhanced CNN Model For Classifying Skin Cancer","authors":"Kazi Md Minhajul Haider, Mondira Dhar, Fahima Akter, Sadia Islam, Syed Ragib Shariar, Muhammad Iqbal Hossain","doi":"10.1145/3542954.3543019","DOIUrl":"https://doi.org/10.1145/3542954.3543019","url":null,"abstract":"Unrepaired deoxyribonucleic acid in skin cells causes skin cancer by generating genetic abnormalities or mutations, rising day by day. Detecting or diagnosing skin cancer in its initial stages is expensive and challenging, giving superior treatment options. Given the severity of these issues, researchers have generated a set of early classification techniques for skin cancer. Skin cancer is diagnosed and segregated from melanoma by looking at the symmetry, color, size, shape, and other features of lesions. While there are various computerized approaches for classifying skin lesions, convolutional neural networks (CNNs) have exceeded standard practices. In this paper, we have used multiple machine learning libraries. Also, we have used five pre-trained models such as VGG-16, VGG-19, Inception V3, Efficient Net B7, ResNet 50 models and presented our proposed model for skin cancer classification using the HAM10000 dataset, which is an enormous skin cancer dataset. This research reports a maximum accuracy of 85.25% for Inception V3 models within five pre-trained models and the highest accuracy of 90.55% for our proposed model. In terms of image detection, our experimental settings show that our suggested model achieved the best classification accuracy than the other five pre-trained models. Our findings are helpful in providing a comprehensive comparison with brief analysis of many deep neural networks in the categorization of skin cancer.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Banking Management System Architecture Using AI & Blockchain 基于AI和区块链的银行管理系统架构
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3542966
Meherab Mamun, B. Arifuzzaman, S. Mahmud
{"title":"Banking Management System Architecture Using AI & Blockchain","authors":"Meherab Mamun, B. Arifuzzaman, S. Mahmud","doi":"10.1145/3542954.3542966","DOIUrl":"https://doi.org/10.1145/3542954.3542966","url":null,"abstract":"The digital revolution has changed many elements within the online banking industries. Even with many state of the art advancements, there are technologies to help secure the banking system on their digital platforms. So therefore it is crucial to have a complete secure system architecture, where various security features aid the digitized platform. In this paper, a banking management system architecture is proposed where the system is devised with the interaction of three modern technologies: Artificial Intelligence, Blockchain, and Hyperledger. All these three technologies are working together as one part of a multi-layer security and management system, as well as, it improves the security of the bank. In order to analyze the implementation of these systems, each of the architectures is defined separately with comparison-based evaluation to derive the fact how these technologies within our system architecture works efficiently.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Analysis of 5.76 Tbits/s SDM-PDM-Nyquist superchannel WDM hybrid multiplexing technique for channel capacity enhancement 5.76 Tbits/s SDM-PDM-Nyquist超信道WDM混合复用技术信道容量增强的实证分析
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3542971
Md. Redowan Mahmud Arnob, Sabiqun Nahar, Mohammad Nasir Uddin
{"title":"An Empirical Analysis of 5.76 Tbits/s SDM-PDM-Nyquist superchannel WDM hybrid multiplexing technique for channel capacity enhancement","authors":"Md. Redowan Mahmud Arnob, Sabiqun Nahar, Mohammad Nasir Uddin","doi":"10.1145/3542954.3542971","DOIUrl":"https://doi.org/10.1145/3542954.3542971","url":null,"abstract":"This article presents the feasibility study of 5.76 Tbits/s SDM-PDM-Nyquist superchannel WDM hybrid multiplexing technique for enhancing the channel capacity over a transmission distance up to 10 km using C-band frequencies in the multimodal domain. This system uses 48 independent channels carrying 48 bits streams of data using 8 C-band frequencies, 2 polarization states, and 3 LP modes. At a transmission distance of 10 km, satisfactory BER (log BER -9.35, faithful Q-factor 6.09, and extinction ratios 7.78 were observed with the minimum OSNR (46.5 dB) of the system, not going below the minimum OSNR (27.8) considering FEC limit. Each channel receives a satisfactory amount of power after 2 stage amplification process leading to a spectral efficiency of 137%.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Machine Learning Techniques to Predict Lung Cancer 预测肺癌的高效机器学习技术
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3543067
Rahul Deb Mohalder, Juliet Polok Sarkar, Khandkar Asif Hossain, Laboni Paul, M. Raihan
{"title":"Efficient Machine Learning Techniques to Predict Lung Cancer","authors":"Rahul Deb Mohalder, Juliet Polok Sarkar, Khandkar Asif Hossain, Laboni Paul, M. Raihan","doi":"10.1145/3542954.3543067","DOIUrl":"https://doi.org/10.1145/3542954.3543067","url":null,"abstract":"One of the most difficult to diagnose and one of the deadliest diseases is lung cancer. A big reason for this is that it takes a long time to identify at an early stage. For treatment, a rapid and precise diagnosis of nodules is very crucial. In order to identify cancer in its early stages, a variety of techniques have been employed. Machine learning approaches were used in this work in order to identify lung cancer nodules. We used machine learning algorithms such as LightGBM, XGBoost, K-Nearest Neighbors, Support Vector Machines, Naïve Bayes, and Random Forest to discover anomalous data. We compared all of the approaches. The results of the experiments reveal that LightGBM produces the greatest outcomes with 99.91 percent accuracy, 0.001261 loss and XGBoost outcomes with 99.86 percent accuracy, 0.001446 loss.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EMG-Based Hand Gesture Dataset to Control Electronic Wheelchair for SCI Patients 基于肌电图的手势数据集控制SCI患者电子轮椅
Proceedings of the 2nd International Conference on Computing Advancements Pub Date : 2022-03-10 DOI: 10.1145/3542954.3542979
S. Afrin, H. Mahmud, Md. Kamrul Hasan
{"title":"EMG-Based Hand Gesture Dataset to Control Electronic Wheelchair for SCI Patients","authors":"S. Afrin, H. Mahmud, Md. Kamrul Hasan","doi":"10.1145/3542954.3542979","DOIUrl":"https://doi.org/10.1145/3542954.3542979","url":null,"abstract":"This paper presents electromyography (EMG)-based hand gesture dataset to control electric wheelchair for the patient with spinal cord injury (SCI). We have recorded eight-channel surface EMG (sEMG) signals from EMG sensor placed at the forearm of the SCI patient. These signals were collected from six hand gesture-based wheelchair control movements (forward, backward, left, right, start and stop). We collected hand gesture data containing different EMG signals from 12 healthy subjects and 7 SCI subjects. Later on, The EMG signals were segmented and the time-domain feature extraction technique was applied to generate 18000 training samples and 10500 testing samples. We then classified the hand gestural EMG signals using 5 different classical machine learning models. We analyze the classification results in two ways. The first one is, training the models using only data of healthy subjects and cross-validated using data from 7 SCI patients. And the second one is by including six SCI patient’s data in the training process along with healthy subjects we performed leave one out cross-validation. From this analysis we were able to achieve highest 95.42% accuracy using decision tree (DT) and Random Forest(RF) algorithms.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信