{"title":"An Analysis of Pairwise Question Matching with Machine Learning","authors":"","doi":"10.30534/ijatcse/2023/021242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/021242023","url":null,"abstract":"n the realm of Natural Language Processing (NLP) and machine learning, lies the challenging quest to detect duplicate question pairs with semantic precision. Our research endeavors to craft a cutting-edge model capable of discerning whether two questions, despite their divergent phrasing, spelling, or grammatical variations, share a common intent on digital forums or search engines. A paramount facet of this study involves the creation and training of an exemplary model using a meticulously curated dataset of labeled question pairs, each annotated as either duplicates or distinct entities. By leveraging state-of-the-art NLP techniques, we aspire to build an exceptionally accurate model that will revolutionize the user search experience by facilitating the identification of duplicate questions. This pioneering research paves the way for a more refined and enhanced approach to tackle the challenges of semantic similarity in the context of question pairs","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and Analysis of an Architecture of Motion Control for a Mobile Robot Using Simulation","authors":"","doi":"10.30534/ijatcse/2023/051242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/051242023","url":null,"abstract":"In recent decades, the control of motion and navigation of mobile robots has received the eminent attention of researchers. Motion control is an important technique that allows a mobile robot (MR) to move adaptively and precisely. The main aim of this research work is to design and analyze the architecture of the navigation and motion control systems for a mobile robot by using Simulink modeling. An encoder sensor is used to analyze the motion control. Experimental and simulation techniques are used to prove the application of the encoder sensor and dead reckoning approach to control MR motion. The modeling of the Simulink model for a motion control system for an MR through MATLAB 2022a software has been presented in this article. The main objective of this research work is to control the motion of the robot in forward and backward directions. The presented model in this paper has been verified through real-time simulation, and it shows the performance of the control system in the predefined optimal time range standard. Finally, this article provides a comprehensive survey of future research trends for the control system of MR.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114275612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of Hindi Character Using OCR-Technology: A Review","authors":"","doi":"10.30534/ijatcse/2023/071242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/071242023","url":null,"abstract":"Recognition of character is a technique that enables the transformation of various kinds of scanned papers into an editable, readable, and searchable format. In the last two decades, several researchers and technologists have been continuously working in this field to enhance the rate of accuracy. Recognition of character is classified into printed, hand-written, and characters written at image recognition. Recognition of character is the major area of research in the field of pattern recognition. This paper presents an overview of Hindi character recognition by utilizing the optical character recognition (OCR) technique. We surveyed some major research breakthroughs in character recognition, especially for Hindi characters. This research article focuses to provide a deeper insight into the researchers and technologists working in the field of recognition of Hindi-character.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Identity Management Using Face Detection Techniques","authors":"","doi":"10.30534/ijatcse/2023/091242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/091242023","url":null,"abstract":"Face recognition, which has applications in iris and fingerprint recognition in addition to face recognition itself, is a crucial component of computer vision and object recognition. In everyday life, face detection is critical in security and forensic investigations. Face identification, whether in fixed photos or video sequences, poses considerable hurdles due to elements such as facial expressions, position fluctuations, occlusion, aging, and resolution. The authors propose the notion of face synthesis to overcome these issues and improve accuracy. They want to enhance recognition rates when working with different face databases by using face synthesis techniques. The study provides an in-depth examination of various facial recognition algorithms, highlighting the problems involved and emphasizing the need to improve efficiency and recognition rates. for large face databases. To show the efficacy of the suggested strategies, the authors compare rates of accuracy and recognition","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arduino Based Real-Time Face Recognition And Tracking System","authors":"","doi":"10.30534/ijatcse/2023/011242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/011242023","url":null,"abstract":"People must remember more passwords and carry more cards these days, as security becomes more important every day. However, such implementations are becoming less safe and feasible, resulting in a surge in interest in biometric systems techniques. Biometrics systems are those that record the physical characteristics of persons in an electronic environment and use that information to recognize them when needed. It works on the idea of identifying a person's physical traits that he cannot change and are distinguishable from others. The designed system aimed to successfully achieve face recognition through real- time detection, comparing the result with pre-recorded face images and tracking the human’s face using a webcam- based system. The system accuracy has been tested in different cases; based on the detection distance, person’s appearance variation, multi-angle posing and multi-people. The system successfully implements face recognition, detection, and tracking with a satisfactory accuracy of 93%","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125725294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Satellite Data for Forest Fire Detection using Deep learning","authors":"","doi":"10.30534/ijatcse/2023/031242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/031242023","url":null,"abstract":"Wildfires are devastating natural disasters that cause damage in the earth's ecosystem. Many detection and mapping systems which are created use a lot of tools, including artificial intelligence methods and good human observations. One of the most used systems is satellite. Remote sensing imagery is widely used for forest fire detection (FFD) due to their large zone coverage, which uses traditional and deep learning methods. In the last decade deep learning techniques have given promising results in remote sensing problems. This study uses Landsat-8 images dataset and deep convolutional network method for FFD. The network used in this paper has a special characteristic which is using simultaneously multiple kernels with different sizes. In this work, to improve the performance of forest fire detection, we have used several data in the deep learning input layer: bands 2, 6 and 7 of Landsat-8, and Forest Fire Index value, which is powerful index for FFD. Three different scenarios were used in this study with 3 network configurations for each one, resulting in 9 total distinct models, using multiple kernels of 3x3, 5x5 and 7x7. Landsat-8 images dataset and deep neural network model used in this paper have given good results in detecting forest fires of distinct shapes and different sizes in multiple difficult tests","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"6 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Feedback on the Programs and Services of Municipal Health Office of Padada through Sentiment Analysis using Convolutional Neural Network","authors":"","doi":"10.30534/ijatcse/2023/061242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/061242023","url":null,"abstract":"This project goal is to assist the Municipal Heath Office of Padada in its daily operation in terms of collecting and facilitating data through its client satisfactory survey forms. There are two systems deployed which is the Web portal and Mobile application. Web portal is the medium to assist municipal health office administrators in reviewing the submitted data and its results coming from the clients who are using the mobile application, modification of the existing details of the programs and services and posting important announcements. The mobile application is utilized by the clients, in medium of submission, the clients can receive announcements posted by the administrators for information dissemination, review the programs and services that is being offered in the health office and the easy access on giving its satisfactory rating and comments. The app was created with through Java (React Native Framework) and JavaScript(ReactS, NodeJS) and with Firebase product and its tools. To obtain final feedback and validate whether or not the desired output was successfully materialized, various testing methods were used. Test cases and results were made and disseminated. The findings indicate that the system passed the testing phase and met the users requirements. Moreover, using the Web portal and Mobile Application, these applications provide user with a quick, easy-to-use and efficiently facilitating results from the collected data coming from different users and automated sending of satisfactory rating and comments","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122767044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Protection in IoT using CoAP based on Enhanced DTLS","authors":"","doi":"10.30534/ijatcse/2023/041242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/041242023","url":null,"abstract":"The Internet of Things (IoT), refers to all the infrastructures and technologies put in place to operate various objects through an Internet connection, it is about connected objects. One of the most frequently used IoT application protocols is the Constrained Application Protocol (CoAP) that matches restricted computers. CoAP is a solution for in-regulated data formats and a high security to protect government-related data from cyber-attacks. CoAP advises using DTLS (Datagram Transport Layer Security) to provide robust security of the UDP-based TLS edition. Initially, DTLS was planned for conventional networks. Therefore, a heavyweight solution is created by moving the protocols over the resource-limited computers. Unfortunately, DTLS has some security issues regarding the management of keys and its vulnerability against common cyber-attacks especially Denial of Service (DoS). Thus, a security approach is important to secure CoAP-based IoT infrastructures from these attacks. In our work, we propose to secure IoT data using enhanced DTLS protocol over CoAP. The enhancement DTLS make it possible to prevent DoS and Distributed DoS attacks. In our proposition, we apply a thrusted party (TP) to which we delegate the process of the authentication and authorization of clients. In addition, the TP is responsible of the verification of IP addresses in order to mitigate attackers from flooding the network with fake hello messages","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective News Text Summarization Techniques","authors":"Manisha M. Langote, Dr. Ranjit Gawande","doi":"10.30534/ijatcse/2023/071232023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/071232023","url":null,"abstract":"n proposed work, we successfully implemented a news text summarization system using Natural Language Processing (NLP) techniques and the Latent Semantic Analysis (LSA) algorithm. The purpose of our project was to extract important information from a large volume of news articles and present it in a concise and easily understandable manner. To achieve this, we utilized the LSA algorithm, which is known for its ability to capture the underlying semantic structure of text. LSA employs a mathematical model to analyse relationships between words in a document, creating a semantic representation where words with similar contexts are grouped together in a vector space. The LSA-based summarization process involved several steps. First, we pre-processed the news articles by removing stop words, punctuation, and other non-relevant elements. Then, we constructed a term-document matrix, where rows represented words and columns represented documents, with matrix values representing word frequencies. Next, we applied Singular Value Decomposition (SVD) to the term-document matrix. SVD helped reduce the matrix's dimensionality by identifying the most important latent semantic concepts. This resulted in a lower-dimensional representation that captured the essential information. Finally, we identified the most important sentences in the news articles by measuring the cosine similarity between each sentence and the summary. Sentences with the highest cosine similarity scores were selected as summary sentences. The proposed system demonstrated the effectiveness of the LSA algorithm for news text summarization. By capturing the semantic structure of the text, it generated summaries that allowed users to understand the key points of a news article quickly and easily. Our implementation had practical applications for content recommendation systems, news aggregation platforms, and personalized news feeds. However, it is important to acknowledge the limitations of the LSA algorithm. It may struggle with handling idiomatic expressions and can be sensitive to the quality of the input data. These considerations highlight the need for ongoing research and development to enhance the performance and robustness of news text summarization systems.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities and Challenges in Biometric Technology","authors":"","doi":"10.30534/ijatcse/2023/061232023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/061232023","url":null,"abstract":"Biometric advancements have the potential to provide more robust security and authentication approaches compared to conventional password-based security measures. When compared to knowledge-based security, biometrics relies on what makes you unique rather than what you know. Biometrics offers promising opportunities to enhance security but also comes with its own set of challenges. Successful implementation requires attention to these possible flaws and a rise in user approval. This article explores the potential benefits of biometric security in an effort to ascertain how broadly adopted it is. It analyses the correlation between user approval and their opinion of the feature's usefulness and accessibility. It also examines crucial acceptability elements like social, organizational, and cost considerations. Biometric systems are a type of pattern recognition technology that may identify a person by vetting their claimed physiological and/or behavioural traits. The following concept of a biometric system can be very broad, which is problematic when thinking about the specifics of contemporary biometric applications. The use of biometrics has the potential to greatly improve upon the security of current methods of authentication and identification. The broad use of biometrics solutions, in fact, has significant ramifications for the way we think about the individual's place in society. However, certain factors and limits are taken into account in the context of the application area, as is the case with any technology. Further progress will be made as scientists investigate multiple, interconnected topics. This paper addresses technical and engineering concerns while highlighting potential applications of contemporary biometric technologies","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}