2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)最新文献

筛选
英文 中文
Software Requirement Classification Using Machine Learning Algorithms 使用机器学习算法的软件需求分类
Vrutik Patel, P. Mehta, Kruti Lavingia
{"title":"Software Requirement Classification Using Machine Learning Algorithms","authors":"Vrutik Patel, P. Mehta, Kruti Lavingia","doi":"10.1109/ICAIA57370.2023.10169588","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169588","url":null,"abstract":"Every software contains numerous processes for building a program, and each step is significant for software requirements. As the globe expands and develops quickly, so does the demand for software. Categorization of requirements can be done manually however doing so requires a lot of human effort, time, money, and risk of inaccurate results. As a result, numerous earlier studies have suggested automating the classification process but consumes lot of time. Here several ways are introduced such that this time taking process can be automated and software requirements can be classified using several machine learning algorithms into various categories. In the process of achieving this there were several algorithms that were taken into consideration which includes KNN, SVM, DT, Naïve Bayes to train dataset and their evaluation metrics were studied.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a System for the Improvement of Network Efficiency in IEEE 802.11E IEEE 802.11E中提高网络效率系统的设计与开发
H. Bedi, Shakti Raj Chopra
{"title":"Design and Development of a System for the Improvement of Network Efficiency in IEEE 802.11E","authors":"H. Bedi, Shakti Raj Chopra","doi":"10.1109/ICAIA57370.2023.10169644","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169644","url":null,"abstract":"The two most critical challenges in developing network protocols for utilizing real-time applications are high throughput and low delay. WLANs enable broadband multimedia communication, thus fulfilling QoS requirements such as these might be problematic. For packet transmission, IEEE 802.11 uses the (DCF) protocol and the BEB algorithm. In WLANs, the packet transmission technique has a major impact on the performance parameters like throughput and delay. So far, various Markov models have been made to check and improve the quality. However, recent models fail with significant packet collisions that decrease throughput and delay, crowded surroundings, and they are still unable to predict the network performance accurately This paper uses, a protocol and algorithm to reduce collisions and prevent the channel capture effect. The performance of the modified protocol, known as the CA-DCF (CAD) protocol, is assessed in terms of throughput and delay.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"492 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Based Reliability Assessment of Modern Power Systems using Machine Learning and Probability Theory 基于机器学习和概率论的现代电力系统可靠性风险评估
B. Rajanarayan Prusty, S. Mohan Krishna, Kishore Bingi, Neeraj Gupta
{"title":"Risk-Based Reliability Assessment of Modern Power Systems using Machine Learning and Probability Theory","authors":"B. Rajanarayan Prusty, S. Mohan Krishna, Kishore Bingi, Neeraj Gupta","doi":"10.1109/ICAIA57370.2023.10169796","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169796","url":null,"abstract":"Risk-based reliability assessment is prevalent for modern power systems under higher penetration of renewable generations. This paper highlights the importance of machine learning and probabilistic approaches for risk-based reliability assessment during power system operation and planning. A set of metrics for realistic risk-based reliability assessment considering over-limit probabilities and corresponding severities is suggested. Probabilistic load flow using Monte-Carlo simulation is used to estimate the over-limit probabilities of power system variables. A detailed presentation of steps for the generation of random samples of a set of correlated random variables, development of realistic risk metrics, and portrayal of their significances via critical result analyses for different cases is expected to serve as a reference text for novice researchers in the field of risk-based reliability assessment of modern power systems integrated with photovoltaic generations.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Copy Move Image Forgery using a Deep Learning Model: A Review 使用深度学习模型检测复制移动图像伪造:综述
K. Lalli, V. K. Shrivastava, R. Shekhar
{"title":"Detecting Copy Move Image Forgery using a Deep Learning Model: A Review","authors":"K. Lalli, V. K. Shrivastava, R. Shekhar","doi":"10.1109/ICAIA57370.2023.10169568","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169568","url":null,"abstract":"The digital images can easily be manipulated using Software tool or mobile application these days. Dispersal of forgery images in social media is one of the prime threats and it has a prodigious impact. Most shared tampered images are based on duplicating some part of the image (copy move image forgery) and merging some portion of two different images (image splicing). Hence, trust in a digital image on social media is becoming extremely hard nowadays. The researchers are highly active in finding a solution for this challenge and there are several papers proposed with different approaches to solve this issue. Most of the suggestions revolve around deep learning models that are efficient and suitable to detect copy move images. This paper focusses on reviewing various Deep Convolution Neural Network (DCNN) approaches and hybrid Deep learning models in copy move image detection by comparative analysis of the experimental outcome of the different models presented for this issue. This research article compares various articles relating to our issue by means of a model, a dataset, and the characteristics of those articles.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of AI Enabled Solution for Efficient Feature Enrichment from Multiple Data Sources: An Application in Precision Agriculture 基于人工智能的多数据源特征高效富集解决方案的开发:在精准农业中的应用
Vatsala Singh, G. Singh
{"title":"Development of AI Enabled Solution for Efficient Feature Enrichment from Multiple Data Sources: An Application in Precision Agriculture","authors":"Vatsala Singh, G. Singh","doi":"10.1109/ICAIA57370.2023.10169451","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169451","url":null,"abstract":"The world is surrounded by enormous amount of data almost generated at an unpredictable velocity, in huge volume, variety and veracity. Our traditional systems, however have not yet reached a state where they can efficiently use every bit of this Big data and incorporate it to derive consistent information. Data Fusion is one such technique which can help us achieve this goal. It can be applied to various fields, however for the scope of this paper we have focused on its implementation in Precision Agriculture. While remote sensing has played a major role in precision agriculture by harnessing satellite data as a non-destructive way of information retrieval. The data collected from these satellite varies widely depending on the technique, spatial resolution, temporal resolution, spectral range, viewing geometry of the sensors, thus providing us different amounts of information for different use cases, some in which makes it quiet challenging for the researchers to harness all the information available to attain higher levels of precision, as high as to be able to classify at a sub pixel level while retaining the efficiency and feasibility of the solution. one of the major pain point in agriculture is monitoring large fields and gauging their crop density per square meter. While crop density of a field depends hugely of the soil quality, moisture, fertilizer percentage knowing crop density can have a great impact on yield prediction, sustainable fertilization and overall better through put of a field. Thus, in this paper we have explored the possibility of fusing data from different sensors using CNN based Data Fusion Algorithm to retrieve crop density and segregate patches of field as sparse or dense respectively. The results are quite encouraging.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125852445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diabetic Retinopathy Detection & Classification using Efficient Net Model 基于高效网络模型的糖尿病视网膜病变检测与分类
Ishika Giroti, J. Das, N. Harshith, Gousia Thahniyath
{"title":"Diabetic Retinopathy Detection & Classification using Efficient Net Model","authors":"Ishika Giroti, J. Das, N. Harshith, Gousia Thahniyath","doi":"10.1109/ICAIA57370.2023.10169756","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169756","url":null,"abstract":"Diabetic retinopathy is an eye disease that progressively degrades a person’s vision. It affects 40-45% of people with diabetes and it is one of society’s leading causes of blindness. Diabetic retinopathy has 4 different phases and with each stage, the eyesight of a person degrades. If diabetic retinopathy is detected in its early phases its effects and progression can be slowed down and save the person from permanent blindness. We aim to utilize ML to detect the disease and classify diabetic retinopathy into its 4 classes based on severity, helping in early detection. This paper gives a glimpse into diabetic retinopathy and proposes a methodology to develop a machine-learning model along with deploying the developed model on an AWS based web-app.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flood Risk Assessment Mapping of Nainital District Using GIS Tools 基于GIS工具的首都地区洪水风险评估制图
K. Rai, N. Mishra, Arun Sharma, Sachin Mishra, Prasad Prakashrao Dahale
{"title":"Flood Risk Assessment Mapping of Nainital District Using GIS Tools","authors":"K. Rai, N. Mishra, Arun Sharma, Sachin Mishra, Prasad Prakashrao Dahale","doi":"10.1109/ICAIA57370.2023.10169591","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169591","url":null,"abstract":"Natural disasters, over which humans have no control and which cause far more harm than man-made disasters, have posed the greatest challenge to humanity. Floods are a hydrological disaster that has occurred often in our country since its founding. Rivers like the Ganga and the Brahmaputra run through India. All of these rivers, as well as their tributaries, are involved in a variety of agricultural and human activities. Floods have claimed countless lives and wreaked havoc on the banks of our country’s rivers on numerous occasions. The major goal of our research is to evaluate the many aspects that influence flood risk zonation mapping of 2021 and, as a result, damage assessment. The study area will be the Nainital district of the state of Uttrakhand, with Sentinel 2A as the dataset. The flood mitigation indices, climatic factors, and shapefiles will be interpolated using the Analytical Hierarchical Process (AHP), which will aid in the construction of Flood risk zonation mapping. Flood research is essential in order to reduce the loss and destruction caused by this tragedy.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 4-bit servo tracking type ADC using Sky-Water SKY130 PDK and eSim 基于skywater SKY130 PDK和eSim的4位伺服跟踪型ADC设计
Ashwini Kumar, Kunal P. Ghosh, Sumanto Kar, Rahul Paknikar
{"title":"Design of 4-bit servo tracking type ADC using Sky-Water SKY130 PDK and eSim","authors":"Ashwini Kumar, Kunal P. Ghosh, Sumanto Kar, Rahul Paknikar","doi":"10.1109/ICAIA57370.2023.10169547","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169547","url":null,"abstract":"Analog-to-digital converters are extensively used for digital signal processing. In this paper, a 4-bit servo tracking type ADC is designed to convert the analog signal to a digital signal. The amplitude range of the analog input signal is 0 to 1 V. Verilog code is designed and simulated in Makerchip IDE for a 4-bit up-down counter circuit. The 4-bit up-down counter along with SKY130 PDK (Process Design Kit) components like resistors and op-amps are used in the circuit design. The 4-bit binary input is converted to analog output using an R-2R ladder type DAC (Digital to Analog Converter). The circuit is simulated in the eSim EDA tool developed by IIT Bombay.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gameplay Automation 游戏自动化
Shaik Mahammad Aasheesh, K. N. S. R. Reddy, Manideep Yellani, D. N, Soumya Shridhar Hegde
{"title":"Gameplay Automation","authors":"Shaik Mahammad Aasheesh, K. N. S. R. Reddy, Manideep Yellani, D. N, Soumya Shridhar Hegde","doi":"10.1109/ICAIA57370.2023.10169757","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169757","url":null,"abstract":"Reinforcement Learning has performed remarkably well in various games and has the potential to surpass human level gameplay. Although it does good in turn-based games, complex game genres like fighting or much more complex 3D shooters are still a challenge. The created ML model can teach itself how to play a specific game so that it can be used to test the games for completeness, bugs, and irregularities. The model is also used to find out if there are any ways to speed run games by exploiting certain in-game mechanisms or to check if any characters or abilities are overpowered. Models were created for a few games to identify how well these AI models can perform and see what kind of differences were required to switch between the games.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116442559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier Baugh Wooley乘法器的新型模糊安全架构
Jyotirmoy Pathak, S. Tripathi
{"title":"Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier","authors":"Jyotirmoy Pathak, S. Tripathi","doi":"10.1109/ICAIA57370.2023.10169781","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169781","url":null,"abstract":"The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信