2022 7th International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Effect of Genetic Algorithm in Optimizing Deep Structured Petroleum Reservoir Classifier 遗传算法在深层构造油气藏分类优化中的作用
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079293
R. K. Pandey, Adarsh Kumar, Akhilesh Kumar Sharma, R. K. Sharma, Ha Huy Cuong Nguyen
{"title":"Effect of Genetic Algorithm in Optimizing Deep Structured Petroleum Reservoir Classifier","authors":"R. K. Pandey, Adarsh Kumar, Akhilesh Kumar Sharma, R. K. Sharma, Ha Huy Cuong Nguyen","doi":"10.1109/ICCCS55188.2022.10079293","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079293","url":null,"abstract":"Well-test analysis contributes to petroleum reservoir description for field development. The reservoir formation identification is the foremost step in characterizing petroleum reservoirs. This research aims to investigate the performance of evolutionary optimization assisted deep structured classifier to identify the homogeneous and fractured reservoirs. The classifier consists of OSTM-long short-term memory and dense neural networks. The hyper-parameters of the classifier have been fine tuned, using evolutionary optimization. The (GA)genetic algorithm conducts a rigorous problem space search to fine-tune the model. The proposed classifier has attained 95.53% accuracy in classifying the reservoirs and their external boundaries. An optimized classifier automatically detects the reservoir formations minimizing human efforts and costs.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122054011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study of Different Convolution Neural Network Architectures for Hyperspectral Image Classification 不同卷积神经网络结构在高光谱图像分类中的比较研究
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079495
M. K. Singh, B. Kumar
{"title":"A Comparative Study of Different Convolution Neural Network Architectures for Hyperspectral Image Classification","authors":"M. K. Singh, B. Kumar","doi":"10.1109/ICCCS55188.2022.10079495","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079495","url":null,"abstract":"In recent years, remote sensing and other applications have used hyperspectral image processing in a variety of ways. For more precise and in-depth information extraction, hyperspectral images offer a wealth of spectral information to recognize and discriminate spectrally identical materials. Numerous cutting-edge methods based on spectral and spatial data are available for hyperspectral image classification. Convolutional neural network (CNN), a subclass of artificial neural networks has gained popularity in a number of fields, including hyperspectral image classification. CNN is built to automatically and adaptively learn spatial hierarchies of data by backpropagation using a variety of building blocks, including convolution layers, pooling layers, and fully connected layers. In this paper, different CNN architectures such as IDCNN, 2D-CNN, 3D-CNN and 3D2D-CNN are evaluated to classify hyperspectral images. Experiments are performed on Indiana Pines and Pavia University images. Experimental results show that 3D2D-CNN gives highest classification accuracy.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127872735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things (IoT) applications and Challenges: A Study 物联网(IoT)应用与挑战:研究
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079508
Rajesh Kumar, Harishchander Anandaram, K. Joshi, Vivek Kumar, Jadeep Reshi, R. Saini
{"title":"Internet of things (IoT) applications and Challenges: A Study","authors":"Rajesh Kumar, Harishchander Anandaram, K. Joshi, Vivek Kumar, Jadeep Reshi, R. Saini","doi":"10.1109/ICCCS55188.2022.10079508","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079508","url":null,"abstract":"Internet of Things (IoT) transformed finished the general unlimited wrapper of persons, keen devices, intelligent effects, statistics, and arguments of attention. It is no unidentified that as continually accomplishes important additional to the network, the experiments of protective the archives that they inform and the transferences that they effort have acquired progressively heedful. Through the centuries, we’ve obvious about pouring in Internet of Things (IoT) devices, expansively in two domains– in homes and in accumulating. Since those are balanced and shut structures, the responsibilities of protective the devices regulator with the performance residence whole salers. In this chapter, we will state-owned arithmetic nonviolent protection in hypothesis and supplementary governments. Administrations which contribute current, oil &petrol, riddling, treatment drugs, eating times and imbuement, water cure, and a lot more are constantly bidding to comprise the accurate covers of protection, as they permit on increasingly more device and devices on the network. Apparatus discoverers and bloom crown movements administrators constantly expressions exercise to viewpoint their bodily things from numerical hazards. It is also for every one of these activities, the background of the data, topologies of IoT applications, and problems of vulnerability controller and hopeful consistence worldly normally.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Scheme For Feature Selection Using Filter Approach 一种基于滤波方法的特征选择新方案
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079604
Damodar Patel, A. Saxena, Suman Laha, Gulame Mustafa Ansari
{"title":"A Novel Scheme For Feature Selection Using Filter Approach","authors":"Damodar Patel, A. Saxena, Suman Laha, Gulame Mustafa Ansari","doi":"10.1109/ICCCS55188.2022.10079604","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079604","url":null,"abstract":"This paper proposes a wrapper based scheme for feature selection in unsupervised data sets. This scheme first ranks features in a dataset as per their Laplacian scores. Subsequently, subsets of features are selected considering feature's rank. Each selected feature subset is then tested for classification accuracy. In order to achieve reasonable satisfactory results, feature subsets are iteratively tested for accuracy as well as cardinality using incremental approach. Four real benchmark datasets namely colon, leukaemia-l, lung-discrete & warpPIE10 have been used for the experiments in this paper. Accuracy above 80% and number of features reduced to less than 20% of the total number of features in each dataset justify the potential of the proposed scheme to be applied to other large datasets as well.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning based Sentiment Analysis of Hindi Data with TF-IDF and Count Vectorization 基于TF-IDF和计数矢量化的机器学习的印地语数据情感分析
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079323
Ashwani Gupta, U. Sharma
{"title":"Machine Learning based Sentiment Analysis of Hindi Data with TF-IDF and Count Vectorization","authors":"Ashwani Gupta, U. Sharma","doi":"10.1109/ICCCS55188.2022.10079323","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079323","url":null,"abstract":"Sentiment refers to emotions. Sentiment analysis, often known as opinion mining, is the technique of identifying and extracting subjective data from pre-web and post-web reviews using text analytics, computational linguistics, and natural language processing. Hindi is an Indian language which is used by many of Indians. Due to phenomenal growth of online product reviews in Hindi post-web Hindi reviews are also increasing rapidly. A machine learning based method in this paper to analysis postweb text data. The present method is divided into four steps. First of all, an annotated Hindi review data set is developed from post-web sources. In second step, feature extraction is performed on annotated Hindi review dataset using the Term-Frequency/ Inverse-Document Frequency (TF-IDF) and count vectorization techniques. In the third step, the retrieved features are given to the classifier so it can make predictions. Moreover, annotated dataset translated into English. Second step and third step are performed on annotated English dataset in last step. A range of evaluation criteria, including precision, recall, and F1- score, are presented in the results. In both instances, the support vector machine produced the most pertinent results.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123977641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solutions of Second Order Homogenous Linear Differential Equation 二阶齐次线性微分方程的解
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079253
Naveen Mehra, S. K. Chanyal
{"title":"Solutions of Second Order Homogenous Linear Differential Equation","authors":"Naveen Mehra, S. K. Chanyal","doi":"10.1109/ICCCS55188.2022.10079253","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079253","url":null,"abstract":"In this article, we prove that all non-trivial solutions of $f^{prime prime}+A(z) f^{prime}+B(z) f=0$ are of infinite order, when there are some conditions on entire coefficients $A(z)$ and $B(z)$.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning approaches for Crop Yield Prediction: A Review 作物产量预测的机器学习方法综述
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079240
Malika Kulyal, P. Saxena
{"title":"Machine Learning approaches for Crop Yield Prediction: A Review","authors":"Malika Kulyal, P. Saxena","doi":"10.1109/ICCCS55188.2022.10079240","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079240","url":null,"abstract":"By providing food producers with much greater access to data about their operations, artificial intelligence (AI) in agriculture has revolutionized the way that agricultural operations throughout the globe operate. A farming method known as yield mapping employs supervised machine learning algorithms to find patterns in massive data sets that may be utilized for crop planning. A critical problem in agriculture is estimating increased crop output with machine learning algorithms. The current study presents a detailed analysis of the applications of ML for predicting crop yield for different datasets. The research papers have been selected for this review, focused on the latest publications, which suggests how vital is this research field. The techniques, traits, and qualities employed in studies related to crop yield prediction were extracted from that research and correlated in this study. In the models, soil type, rainfall, season, and temperature are the most often utilized characteristics, and Random Forest is the most frequently used method, according to our research. Deep learning-based studies were also analyzed, and the most commonly used Deep Learning technique is DNN and CNN.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123715130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI/ML Based new smart customer feedback system for hospitality Industry 基于AI/ML的酒店行业新型智能客户反馈系统
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079480
Ramnarayan, K. Joshi, Jagdeep Reshi, M. Memoria, Ashulekha Gupta, Neha Rastogi
{"title":"AI/ML Based new smart customer feedback system for hospitality Industry","authors":"Ramnarayan, K. Joshi, Jagdeep Reshi, M. Memoria, Ashulekha Gupta, Neha Rastogi","doi":"10.1109/ICCCS55188.2022.10079480","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079480","url":null,"abstract":"Since the last many years customer satisfaction play a significant role to improve the hospitality industry. In this article we introduce a proposed technology based practical and theoretical framework for customer feedback management system to improve the hospitality services and to enhance the customer business era. Technology such as Artificial intelligence and machine learning has important role to develop scalable smart feedback system. AI solution support the responding process for online customer reviews and assist the using automatically collected data. Sometime this is difficult to interpret the collected data form the customer, so we apply machine learning to fetch the corresponding data. Our solution contributes the existing customer feedback application to provide the smart feedback system to improve smart and open platform the customer and hospitality industry.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129247221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PDF Malware Analysis PDF恶意软件分析
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079419
Md Yusuf Khalil, Vivek, K. Anand, Antarlina Paul, Rahul Grover
{"title":"PDF Malware Analysis","authors":"Md Yusuf Khalil, Vivek, K. Anand, Antarlina Paul, Rahul Grover","doi":"10.1109/ICCCS55188.2022.10079419","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079419","url":null,"abstract":"This document addresses the issue of the actual security level of PDF documents. Two types of detection approaches are utilized to detect dangerous elements within malware: static analysis and dynamic analysis. Analyzing malware binaries to identify dangerous strings, as well as reverse-engineering is included in static analysis for t1he malware to disassemble it. On the other hand, dynamic analysis monitors malware activities by running them in a safe environment, such as a virtual machine. Each method has its own set of strengths and weaknesses, and it is usually best to employ both methods while analyzing malware. Malware detection could be simplified without sacrificing accuracy by reducing the number of malicious traits. This may allow the researcher to devote more time to analysis. Our worry is that there is no obvious need to identify malware with numerous functionalities when it isn't necessary. We will solve this problem by developing a system that will identify if the given file is infected with malware or not.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact Of Ai On The Banking Industry 4.0 人工智能对银行业4.0的影响
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079399
Prenjal Tayal, Neha Rastogi, Tarunpreet Kaur Ahuja, S. Tyagi, K. Joshi, Yasmin Makki Mohialden
{"title":"Impact Of Ai On The Banking Industry 4.0","authors":"Prenjal Tayal, Neha Rastogi, Tarunpreet Kaur Ahuja, S. Tyagi, K. Joshi, Yasmin Makki Mohialden","doi":"10.1109/ICCCS55188.2022.10079399","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079399","url":null,"abstract":"Moving forward in the fourth-generation industry, which is known as Industry 4.0 or the Fourth Industrial revolution, defined as merger of advanced manufacturing techniques with the Internet of Things to create manufacturing systems that communicate, analyze, and use information to stay inter connected so that give back intelligent action to the physical world. Artificial intelligence is the substitute of human intelligence processes by machines, especially computer systems, it is also known as machine learning, which focuses on creating and managing that type of technology that help in independently making decisions and do actions on behalf of a human being. It is changing the way we live, interactions with clients and companies, which also changes existing business methods and financial services. This study focuses on reviewing banks in a fourth industrial revolution, this paper has qualitative approach from the references, we will confer how Artificial Intelligence is used in the banking sector, the benefits and the Challenges faced by banking industry. Development of Artificial Intelligence has different ways in which it can improve the operations of a banking industry and safeguard customers with priority section.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信