2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

筛选
英文 中文
Several Categories of Energy-Efficient Routing Protocols, Features, and Security Necessities in WSN: A Review 无线传感器网络中几种节能路由协议、特性和安全要求综述
Swati, Mamta Arora
{"title":"Several Categories of Energy-Efficient Routing Protocols, Features, and Security Necessities in WSN: A Review","authors":"Swati, Mamta Arora","doi":"10.1109/ICICT55121.2022.10064506","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064506","url":null,"abstract":"WSN is a novel technology used to monitor the real environment. The sensor nodes are proficient in sensing a variety of ecological situations and have some processing proficiencies and the capability to relay the data they collect wirelessly. WSN routing algorithms are responsible for choosing and maintaining data routes to provide regular and effective communication. Due to the energy limitations of WSNs, energy conservation has been the primary goal of several routing methods. The SNs have an extremely restricted power source that is non-rechargeable and rechargeable, posing a substantial EC problem. Energy management is a critical concern for extending the network's lifespan. Because SNs also function as routers, determining the best routing method is critical for reducing energy consumption. This article surveyed a detailed overview of characteristics, necessities, classification of routing protocols, and existing assessment of different EE (energy-efficient) routing methods in WSNs. The analysis of the different existing routing protocols with different parameters such as network lifetime, residual energy, and total energy consumption.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Mask Detection Using Convolution Neural Network 基于卷积神经网络的人脸检测
Pankaj Kumar, V. K. Gupta, D. P. Singh
{"title":"Face Mask Detection Using Convolution Neural Network","authors":"Pankaj Kumar, V. K. Gupta, D. P. Singh","doi":"10.1109/ICICT55121.2022.10064500","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064500","url":null,"abstract":"Face recognition in the industry now is playing an important role in each sector. Each person has different type of features and face; therefore, each identity is unidentical. In this COVID outbreak, a major crisis has occurred due to which preventions are to be made. One such prevention is use of a face mask which is very much important. Nowadays, various firms and organizations are using facial recognition systems for their own general purpose. We all know that it has now been a crucial task to wear a mask every time, when we go somewhere. But as we know it is not possible to keep track of who wears a mask and who does not. We make the use of AI in our daily life. We achieve this with the help of a neural network system, which we train so that it can further describe people's features. Even though the original dataset was limited, the Convolutional Neural Network (CNN) model achieved exceptional accuracy utilizing the deep learning technique. With the use of a face mask detection dataset that contains both with and without face mask photographs, we are able to recognize faces in real-time from a live webcam stream using OpenCV. We will develop a COVID-19 face mask detection system using our dataset, along with Python, OpenCV, Tensor Flow, and Keras.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125373805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspect Analysis of Dementia Patients 痴呆患者的方面分析
Saloni Gupta, Riya Sharma, N. Sharma, M. Mangla
{"title":"Aspect Analysis of Dementia Patients","authors":"Saloni Gupta, Riya Sharma, N. Sharma, M. Mangla","doi":"10.1109/ICICT55121.2022.10064519","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064519","url":null,"abstract":"Early diagnosis of Mental Cognitive Disorders (MCD) is crucial in establishing timely treatment to delay further progression of the disease. This paper demonstrates a data visualization and statistical data analysis of dataset collected from Kaggle. In this paper the authors have derived an analysis of a dataset based on Mild cognitive impairment (MCI) disorder. Most of the data that is brought to work is not clean and requires substantial amount of Data cleaning. Hence, for pre-processing and cleaning of data, we imported many python libraries and dealt with NULL values and outliers. These NULL values and outliers were treated using statistical methods and were replaced by their means and medians. Data visualization is the pictorial depiction of data by using visual elements like charts, graphs and maps. When data-processing and cleaning was completed, data was visualized with varied graphs and charts to create appealing, informative and detailed plots for presenting data in the most effective and easy way. The results focused on the visualization of demented and non-demented people of different genders along with other parameters to lay out a clear picture for the reader.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131495708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measures of a Series System's Reliability for One or Two Decimal Random Data Points 一个或两个十进制随机数据点的串联系统可靠性度量
Harpreet Kaur, S. Sharma
{"title":"Measures of a Series System's Reliability for One or Two Decimal Random Data Points","authors":"Harpreet Kaur, S. Sharma","doi":"10.1109/ICICT55121.2022.10064557","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064557","url":null,"abstract":"we talk about Weibull distribution for examination of real-world data and reliability. This distribution is regarded as a well-liked lifespan distribution that describes phenomena that have monotonic component failure rates. It can be used to model a range of real-life behaviors, depending on the values of the parameters. By taking Weibull failure laws into consideration, reliability metrics like reliability and mean time to system failure (MTSF) of a series system of “n” identical components are derived. By assuming Rayleigh and exponential failure distributions, the outcomes of these measures are also assessed for the particular case of the Weibull distribution. For any values of the parameters relating to the number of components, their failure rates, and operation time, the behavior of the MTSF and reliability have been graphically depicted.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126603789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of AES Software Implementation for IoT Systems 物联网系统AES软件实现研究
Amitesh Tripathy, Brahmjit Singh
{"title":"A Study of AES Software Implementation for IoT Systems","authors":"Amitesh Tripathy, Brahmjit Singh","doi":"10.1109/ICICT55121.2022.10064507","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064507","url":null,"abstract":"The Internet of Things (IoT) is a network of physical objects. This concept enables data exchange between connected things without human intervention. However, the devices being constrained in resources in terms of computing power, memory storage, and energy sources, implementation of traditional security encryption algorithms is not suitable for these devices. It is important to develop light weight low power security solutions for IoT devices and implementations. Advanced Encryption Standard (AES) is the widely used standard encryption method and could be considered to provide security to IoT based networks. However, standard AES needs to be optimised in terms of energy savings, and reduced area for implementation. The approach of software implementation of the AES is associated with high latency. It is, therefore, important to explore the implementation of the AES on hardware in area-restricted way. In this work, we present an architecture of 8-bit data path aiming to achieve reduced area for hardware implementation.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127912401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Literature Review on Automatic Comment Generation using Deep Learning Techniques 利用深度学习技术自动生成评论的文献综述
P. Singh, Saransh Sharma
{"title":"A Literature Review on Automatic Comment Generation using Deep Learning Techniques","authors":"P. Singh, Saransh Sharma","doi":"10.1109/ICICT55121.2022.10064537","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064537","url":null,"abstract":"During the development of software, thousands of lines of codes are written and without proper comments it gets difficult for the developers to read the code. Automatic Comment Generation overcomes this problem by generating comments for the source code. Many researchers are already working on automatic comment generation in the source code and some have already published their results but still there is lot of scope of improvement in the field of automatic generation of comments in the source code. In this paper, we will be explaining and reviewing deep learning techniques that areused in comment generation to make the code easily readable. Generating comments automatically become crucial in the source code for any developer to understand it easily without spending much time. Hence, it's very important to understand how deep learning techniques like CNN, RNN, LSTM and others are making it possible to generate automatic comments in source code and also why researchers have now shifted on deep learning techniques to do automatic comment generation.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129096054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Workload under Distraction using Supervised Learning Algorithms 使用监督学习算法预测分心下的工作量
Abhijeet Kujur, A. Bhattacharya, Greeshma Sharma, J. Kumar
{"title":"Prediction of Workload under Distraction using Supervised Learning Algorithms","authors":"Abhijeet Kujur, A. Bhattacharya, Greeshma Sharma, J. Kumar","doi":"10.1109/ICICT55121.2022.10064593","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064593","url":null,"abstract":"The complexity of activities in high-risk affairs is increasing daily because of advances in pervasive computing and contemporary interactive technologies. Numerical dexterity and accuracy are critical in various fields such as medical emergency, flights and space travel, radiation sensitive substance managing, defence and border security. Previous research has emphasised the role of attention involving number crunching and the mental exertion it entails. And yet, there is a dearth of research quantifying cognitive load while manipulating stimuli according to the proximity and similarity principles of Gestalt theory. The present research attempts to bridge this gap by capturing neurophysiological data during numerical estimation tasks with induced distraction by conflicting Gestalt perception and then employing predictive analytics methods. Pupillometry and Electroencephalography (EEG) are neurophysiological tools extensively employed in the study of mental load in various settings. This study reviews two dual segregation algorithms like eXtreme gradient boosting (XGBoost) and AutoML that are used for cognitive load identification. The dataset considered the power spectral density (PSD), motivation index (Frontal Alpha Asymmetry), relative power of EEG frequency bands, and pupil dilation. It was seen that as cognitive task load increased the Low beta frequency EEG waves (12.5-18 Hz) became more prominent, and were most active in the frontal regions. Right pupil dilation and frontal theta PSD were also noticed along with that. The significance of the study is to select the fewest or most informative modalities for monitoring in actual working contexts.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122716965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of IPv4 and IPv6 in VANET Routing VANET路由中IPv4和IPv6的性能分析
Raj Bala, Mukesh Bansal
{"title":"Performance Analysis of IPv4 and IPv6 in VANET Routing","authors":"Raj Bala, Mukesh Bansal","doi":"10.1109/ICICT55121.2022.10064554","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064554","url":null,"abstract":"Internet Protocol version6 (IPv6) is the sixth revision to Internet Protocol. This protocol is going to replace IPv4 totally in future. Apart from serving the increasing demand for IP addresses, it also bundles other features for better health of Internet. It is anticipated that IPv6 will boost up speed and quality of service. With increasing demand to provide network to moving users, it has become absolutely important to analyze deployment of IPv6 in the network of moving vehicles, VANET. VANET is a self-organizing wireless network of running or stationary vehicles intended to support safety or intelligent transportation related information exchange between them. Routing plays an important role to facilitate vehicles communicate effectively. That is why this paper intends to compare performance of IPv6 and IPv4 in VANET routing. Two routing protocols, AODV and GPSR are used here for the purpose of analyzing performance in different scenarios. Two parameters are considered to measure and compare performance of IPv6 and IPv4. First parameter is Packet Delivery Ratio (PDR) and second is End-to-End Delay (E2ED). Network Simulator, NS-2 in amalgamation with broadly accepted VanetMobiSim is used to carry out simulation for the selected study. It is observed here that IPv6 provides better performance to both AODV and GPSR as compared to IPv4.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning in Student Health - A Review 学生健康中的机器学习-综述
Deivanai Gurusamy, P. Chakrabarti, Midhun Chakkaravarthy
{"title":"Machine Learning in Student Health - A Review","authors":"Deivanai Gurusamy, P. Chakrabarti, Midhun Chakkaravarthy","doi":"10.1109/ICICT55121.2022.10064532","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064532","url":null,"abstract":"Students' health is an important research topic today because they are the cornerstone of our society. Researchers have used various technological breakthroughs to address schoolchildren's and college/university students' health issues, and machine learning is now frequently employed. However, to understand the efficacy of machine learning and progress in student health research, a concise review of the influence of machine learning on student health is required, which the paper provides. The paper's primary objective is to examine which of the students' health concerns are efficiently addressed by machine learning algorithms and the outcomes of the approaches. The paper also discusses what leads students to perform poorly in schools, colleges, and universities and if machine learning will improve student health in the future. The review findings can be helpful to researchers in moving forward with unaddressed health-related problems and other solutions concerning the student's health.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diet Recommendation using Predictive Learning Approaches 使用预测学习方法推荐饮食
Anjali Jain, Alka Singhal
{"title":"Diet Recommendation using Predictive Learning Approaches","authors":"Anjali Jain, Alka Singhal","doi":"10.1109/ICICT55121.2022.10064538","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064538","url":null,"abstract":"In the modern world, people's health is one of their top priorities. As a result of inadequate nutrition, many people in the modern world are afflicted with a variety of diseases. It is urgently necessary to make timely and easy recommendations for a balanced diet, which is quite challenging. Time is one of the major restraints in today's world, therefore authors created a system for recommending diets to people based on their unique health needs, whether they are trying to gain weight, lose weight, or get a health checkup. The system is built on machine learning classifiers including Random Forest, Support Vector Machine, Ada Boost, and Gradient, as well as clustering methods like K-means. Boost. After calculating Body Mass Index and the user's desire for diet based on their health state (overweight, underweight, or healthy), the suggested system makes meal recommendations based on the user's age, height, and weight. The proposed paper summarises numerous similar works and evaluates the effectiveness of the suggested strategy. The performance comparison is displayed in terms of recall, recall accuracy, precision, and f1-measure.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信