Proceedings of the 4th International Conference on Information Management & Machine Intelligence最新文献

筛选
英文 中文
Absolute Data Security Scheme: An Advanced Approach towards Data Security 绝对数据安全方案:数据安全的高级方法
Ritu Shukla, Dinesh Goyal, Shruti Thapar, Rohit Chhabra
{"title":"Absolute Data Security Scheme: An Advanced Approach towards Data Security","authors":"Ritu Shukla, Dinesh Goyal, Shruti Thapar, Rohit Chhabra","doi":"10.1145/3590837.3590953","DOIUrl":"https://doi.org/10.1145/3590837.3590953","url":null,"abstract":"With the exponential increase in the applications of digitalization, the risk of data breach and theft is also rising tremendously. The abrupt increase in the use of digital money, especially after demonetization and then during Corona pandemic, has developed dependencies on the online transactions via different digital payments and financial service providers. In this it has become challenging to keep the information including credentials, One Time Password etc. secure. In the course of time, number of blooming techniques are introduced which secure the information whether it is in the network or stored at secured architecture. But the soul of these techniques is the complex algorithms that keep the data confidential from the attackers/ unintended users. In this paper we are proposing a robust scheme named as Absolute Data Security Scheme which can be useful for securing applications commonly used in modern environment. A customized version of International Data Encryption Algorithm (IDEA) algorithm is used in combination with message digest algorithm to provide better security. It is a combination which preserves the confidentiality as well as integrity of the data. This scheme is a combination of encryption; decryption and message digest techniques which contribute in the secure transmission of the data.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keypoint Detection for Identifying Body Joints using TensorFlow 基于TensorFlow的人体关节关键点检测
Anuj Grover, D. Arora, Anant Grover
{"title":"Keypoint Detection for Identifying Body Joints using TensorFlow","authors":"Anuj Grover, D. Arora, Anant Grover","doi":"10.1145/3590837.3590948","DOIUrl":"https://doi.org/10.1145/3590837.3590948","url":null,"abstract":"Keypoint Detection for the Body Joints is a process of finding and detecting all the important body joints of a human being. It takes an RGB image as input gives a list of keypoints as output. It can be applied for single-person body joints detection or multi-person body joints detection. The various architectures for detecting the human body joints can be compared using the Percentage of Detected Joints (PDJ), Object Keypoint Similarity (OKS) and mean Average Precision(mAP) evaluation metrics. The state-of-the-art body joint detection architectures like DeepPose, Higher Resolution Network and OpenPose architectures were studied and compared against each other. These architectures were evaluated on the COCO dataset for the 17 key body joints using the OKS and mAP evaluation metrics. The evaluation results on all the body joints were compared to each other for each architecture. The architectures were implemented using opensource implementations of the PyTorch and TensorFlow libraries. The HRNet architecture was the fastest and most accurate of all the architectures.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131826487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analysis of Blockchain-based IoT solutions to overcome current challenges 分析基于区块链的物联网解决方案,以克服当前的挑战
Ujwal Gupta, Ziya Javed, S. Zafar
{"title":"An analysis of Blockchain-based IoT solutions to overcome current challenges","authors":"Ujwal Gupta, Ziya Javed, S. Zafar","doi":"10.1145/3590837.3590874","DOIUrl":"https://doi.org/10.1145/3590837.3590874","url":null,"abstract":"With the ongoing boom in IoT technology its usage has increased drastically and that took over a vast range of use cases. As the use of IoT increases over time so does the need to solve the challenges which come with it. Security, Data Privacy & management, and single point of failure are some of those major challenges. A decentralized & distributed technology called blockchain emerges as a workable remedy to this problem. The goal of this paper is to give a review of published papers that provides possible blockchain-based solutions to overcome challenges faced by IoT. This paper analyses the multiple papers to provide a comprehensive survey on security & other improvements achieved in IoT systems using blockchain and the challenges that originate during this integration.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evapotranspiration Based Smart Irrigation System for Agriculture 基于蒸散发的农业智能灌溉系统
M. Kuveskar, P. Khandekar, Anuradha Bakare
{"title":"Evapotranspiration Based Smart Irrigation System for Agriculture","authors":"M. Kuveskar, P. Khandekar, Anuradha Bakare","doi":"10.1145/3590837.3590845","DOIUrl":"https://doi.org/10.1145/3590837.3590845","url":null,"abstract":"The water is most precious thing on the Earth. The agriculture sector is main user of available fresh water on the earth. We have to use water optimally and if crops are irrigated optimally then yield will be more. In the paper we have, implemented Evapotranspiration based Smart Irrigation System for Agriculture. The system is implemented using online weather parameters, data from moisture sensor and Raspberry pi. Estimation of crop water requirements (ETc) is one of the major parameter used in automated irrigation system. The prediction of Reference Evapotranspiration (ETo) is based on meteorological variables like temperature, humidity, daily sunshine hours, wind speed. By applying a crop coefficient (Kc) values from standard FAO document, we can estimate Crop Evapotranspiration (ETc) using estimated value of this ETo. In this paper, two standard methods are used as “Blanney Criddle method” and “Modified Penman method” to estimate value of reference Evapotranspiration ETo). We have implemented system to determine reference evapotranspiration (ETo) and crop Evapotranspiration (ETc) for Wheat Kharif crop for Pune region. The system is implemented using online weather parameters, data form moisture sensor and Raspberry pi. The data from moisture sensor and crop water requirement (ETc) is used to estimate actual need of irrigation for selected crop and water pump will be automatically ON/ OFF.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121253019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Convolution Neural Network-Based Analysis of Tomato Plant Leaves 基于深度卷积神经网络的番茄叶片分析
Kabir Swami, Anirudhi Thanvi, Nakul Joshi, S. Jangir, Dinesh Goyal
{"title":"Deep Convolution Neural Network-Based Analysis of Tomato Plant Leaves","authors":"Kabir Swami, Anirudhi Thanvi, Nakul Joshi, S. Jangir, Dinesh Goyal","doi":"10.1145/3590837.3590952","DOIUrl":"https://doi.org/10.1145/3590837.3590952","url":null,"abstract":"Plant diseases that may seriously impact agriculture are often discovered with the naked eye, albeit this can take more time and increase the likelihood of a false positive. This issue may be resolved and the chance of decreased plant output is decreased with early discovery. The aim of this experimental research is to deploy intelligence, which can be effectively used for picture classification utilising numerous convolutional neural network (CNN) manners, to automatically identify tomato plant leaf illnesses more quickly. For better performance measurement, the Visual Geometry Group (VGG) model, which is based on CNN, is employed. To diagnose illnesses, this research concludes to categorise photos using VGG-19 transfer learning architectures with various optimizers. In the experimental comparative research, an accuracy of 97.67% and 87.67% was achieved as training and testing with nadam optimizer.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115995714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption 基于数据分散和加密的云安全存储机制
E. V, S. M. Florence
{"title":"Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption","authors":"E. V, S. M. Florence","doi":"10.1145/3590837.3590942","DOIUrl":"https://doi.org/10.1145/3590837.3590942","url":null,"abstract":"The widespread use and significant capability of the cloud storage service have demonstrated how important it is to the quick growth of cloud computing. However, there are still important security incidents that happen as a result of management negligence and malicious attack, resulting in the release of sizable amounts of sensitive data in the cloud storage tier. This paper proposes a CSSM, or secure cloud storage mechanism, to guarantee the confidentiality of data saved in the cloud. A technique to prevent data leakage at the storage layer was added by CSSM. Encrypted, scattered, and distributed storage is carried out via data dispersion and dispersed storage. In order to avoid the leaking of cryptographic materials, CSSM also adopted a hierarchical management strategy and coupled the user password with the exchange of secrets. The experimental findings suggest that the suggested mechanism. It can store a lot of cloud data efficiently without adding a lot of overhead, making it excellent for protecting data security in the storage layer against leaking. Users find it acceptable that it only takes 646 seconds to upload or download a 5G-size file with CSSM.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114889008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolving Roles and Implications of Technology Enabled by 5 G in Various Industries 5g技术在各行业中的作用和影响
T. Garg, Heemika Sharma, Ruchi Goyal
{"title":"Evolving Roles and Implications of Technology Enabled by 5 G in Various Industries","authors":"T. Garg, Heemika Sharma, Ruchi Goyal","doi":"10.1145/3590837.3590862","DOIUrl":"https://doi.org/10.1145/3590837.3590862","url":null,"abstract":"Many wireless technologies of mobile which have been existing for various generations have been studied for this paper. Terms such as its performance over the period, benefits, problems, or the portals were reviewed. This particular paper aims to throw light on the overall or time-being evolution of wireless technology of mobile and its development in the present era along with scope in the future in various fields. Comparing the few past decades of this technology, it has been prominent that this technology had evolved from being IG to 4G and now being the current evolution of 5G which became a revolution in today's era. It is an advanced implementation of wireless technology. In this research main focus would be 5G development over some time and the benefits drawn from it by the various sectors such as education, service, and health, which are considered the prominent sectors of our economy.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Various Approaches Used in Named Entity Recognition for Indian Languages 印度语言命名实体识别方法综述
Rekha Vijayvergia, Bharti Nathani, Nisheeth Joshi, Rekha Jain
{"title":"A Survey on Various Approaches Used in Named Entity Recognition for Indian Languages","authors":"Rekha Vijayvergia, Bharti Nathani, Nisheeth Joshi, Rekha Jain","doi":"10.1145/3590837.3590892","DOIUrl":"https://doi.org/10.1145/3590837.3590892","url":null,"abstract":"Named Entity Recognition (NER)” is a application of Artificial Intelligence , Machine Learning and “Natural Language Processing (NLP”).In NER, various classes of Named entity such as name of a person , an organization name, name of location, name of designation etc., are find out which is required in many NLP activities like question-answering system ,machine translation, artificial intelligence, summarization of documents, academics, robotics, Bioinformatics etc. Mostly NER task was evident for foreign languages but for Indian constitutional languages, due to some challenges present for example scarcity of resources, ambiguity present in languages, morphologically rich behavior of languages etc. ,NER work has been done for few of languages. In our paper, we presented several challenges available in NER for Indian languages and compared them by measuring various standard evaluation metric values like precision, recall and F-measure. In future extension, we would develop a efficient system, which would be more accurate, and which will cater many more Named Entity tags than existing systems ,for Indian languages NER tools.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ore Grade Estimation in Mining Industry from petro-physical data using neural networks 利用神经网络从岩石物性数据估计矿山矿石品位
Gaurav Nagpal, Singh Shrikant Ramesh, Naga Vamsi Krishna Jasti, Ankita Nagpal, G. Sharma
{"title":"Ore Grade Estimation in Mining Industry from petro-physical data using neural networks","authors":"Gaurav Nagpal, Singh Shrikant Ramesh, Naga Vamsi Krishna Jasti, Ankita Nagpal, G. Sharma","doi":"10.1145/3590837.3590954","DOIUrl":"https://doi.org/10.1145/3590837.3590954","url":null,"abstract":"The grade of the ore in mining industry plays a very important role. From the petro-physical data, the grade of the ore can be predicted with reasonable accuracy. However, the existing literature is silent on the techniques of data analytics that can be used for ore-grade estimation with the help of data. The study uses multi-layer neural network perceptron model and neural network regression models for predicting the grade on the basis of Petro-physical data that was collected by doing borehole geophysical survey capturing twenty-one properties of the ore. The research study is able to estimate the grade of the ore with reasonable accuracy using the data.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Artificial Intelligence Enabled Game Engine 基于人工智能的游戏引擎设计
Dr. Aarti Chugh, Dr. Charu Jain, Dr. Anil Kumar
{"title":"Design of Artificial Intelligence Enabled Game Engine","authors":"Dr. Aarti Chugh, Dr. Charu Jain, Dr. Anil Kumar","doi":"10.1145/3590837.3590936","DOIUrl":"https://doi.org/10.1145/3590837.3590936","url":null,"abstract":"Game engines are primarily designed for the development of video games but can also be used as rendering engines for 2D and 3D graphics. They include all relevant libraries and supported programs. Developers can use them to construct games for game consoles and other types of computer softwares. They also aid in the porting of games to multiple platforms. Developers look for platforms which are easily available and provide facilities to create impressive, interesting and animated games. But these software are difficult to run on everyday machines, especially laptops, limiting their use to professionals with dedicated systems. This paper discusses design of new game engine with all the standard features of a rendering engine. The artificial intelligence (AI) aspect of the engine requires rendering of visual data at a lower resolution to improve performance and then using trained Deep Networks to upscale the image to the native resolution of the user's monitor. The AI will ensure that upscaling will be adding detail rather than averaging the nearby pixels. CCS CONCEPTS • Software and its engineering • Software creation and management • Designing software • Software implementation planning • Software design techniques","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信