Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing最新文献

筛选
英文 中文
Assessment of Modified BAT Algorithm for MOOC Learner Influence Maximization 改进BAT算法对MOOC学习者影响最大化的评估
K. Aggarwal, Anuja Arora
{"title":"Assessment of Modified BAT Algorithm for MOOC Learner Influence Maximization","authors":"K. Aggarwal, Anuja Arora","doi":"10.1145/3549206.3549297","DOIUrl":"https://doi.org/10.1145/3549206.3549297","url":null,"abstract":"Identification of a small group of individuals based on their maximal influence cascade is influence maximization. During the COVID-19 pandemic, discussion forums on the Massive Open Online Course (MOOC) platform have become a paramount interaction medium among learners, and the identification of influential learners evolved as a substantial research issue. In this research paper, an optimization function based on an independent cascade is established for the discussion forum influence maximization problem. A modified version of the BAT algorithm is proposed which memorizes the bad experience of the BAT. The proposed Modified algorithm helps the BAT to remember the worst location that has already been traversed for a reliable estimation in an optimized manner while exploring the best solution. Further, the performance of BAT and Modified BAT for influence maximization on the discussion forum network of a MOOC platform is evaluated which shows the excellent performance of modified BAT. Convergence graph for different populations on deviating probability depicts the effective performance of modified BAT over generic BAT algorithm.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125321639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sample Reduction for Support Vector Data Description (SVDD) by Farthest Boundary Point Estimation (FBPE) using Gradients of Data Density 基于数据密度梯度的最远边界点估计支持向量数据描述(SVDD)的样本约简
Pratyush Pareek, Aaryan Bhardwaj, Sanskar Patro, Anirudh Arora, Muskan Deep Kaur Maini, Bagesh Kumar, O. P. Vyas
{"title":"Sample Reduction for Support Vector Data Description (SVDD) by Farthest Boundary Point Estimation (FBPE) using Gradients of Data Density","authors":"Pratyush Pareek, Aaryan Bhardwaj, Sanskar Patro, Anirudh Arora, Muskan Deep Kaur Maini, Bagesh Kumar, O. P. Vyas","doi":"10.1145/3549206.3549287","DOIUrl":"https://doi.org/10.1145/3549206.3549287","url":null,"abstract":"Classification is a quintessential application of machine learning for which support vector machines have been used ubiquitously because of their optimal margins and ease of use. However, they’re rarely used for large datasets due to the cubic time complexity of their training process. This has inspired several papers attempting to reduce the number of features or the number of training samples to lessen the training time of the SVMs. This paper aims to propose a novel approach for reducing the number of training samples for support vector data description (SVDD) while attempting to maximize the knowledge of the target class by selecting the most promising candidates for support vectors, which are the farthest boundary points of the data clusters. The proposed algorithm utilizes the density gradient across the data distribution to uniformly detect the boundary points, which are sampled as potential support vectors to train the support vector machines in a smaller amount of time without significant loss in accuracy. The proposed algorithm is verified via tests conducted on Human Activity Recognition, Breast Cancer Detection, and Heart Disease Detection Datasets.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Vehicle Tracking and Speed Estimation Model using Deep Learning 基于深度学习的多车跟踪和速度估计模型
Prajwal, Navaneeth, Tharun, Amit Kumar
{"title":"Multi-Vehicle Tracking and Speed Estimation Model using Deep Learning","authors":"Prajwal, Navaneeth, Tharun, Amit Kumar","doi":"10.1145/3549206.3549254","DOIUrl":"https://doi.org/10.1145/3549206.3549254","url":null,"abstract":"Speed estimation of vehicles is one of the prime application of speed estimation of moving objects. The YOLOv5 model has proven to have a very good accuracy in detecting moving objects in real-time. The vehicles on the road are extracted from each frame of the video by running it through a custom YOLOv5 object detector. The YOLO model splits the frame into a grid and each grid detects a vehicle within itself. An instance identifier tracks the vehicle across the frames. The tracking algorithm computes deep features for every bounding box and utilizes the similarities within the deep features to identify and track the object. The pixel per meter metric has to adjusted based on perspective after which the speed of the vehicle can be estimated. Finally a comparison of our model metrics with the existing state of the art models is provided.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques 使用机器学习和深度学习技术的多域网络流量分析
Dincy R. Arikkat, A. RafidhaRehimanK., P. Vinod, S. Yerima, W. Manoja, S. Pooja, Shilpa Sekhar, Sohan James, Josna Philomina
{"title":"Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques","authors":"Dincy R. Arikkat, A. RafidhaRehimanK., P. Vinod, S. Yerima, W. Manoja, S. Pooja, Shilpa Sekhar, Sohan James, Josna Philomina","doi":"10.1145/3549206.3549262","DOIUrl":"https://doi.org/10.1145/3549206.3549262","url":null,"abstract":"Recent heterogeneous computing facilities and data explosion introduce challenges in network traffic analysis and demand intelligence-based approaches to ensure cyber security and the protection of online digital services. Researchers have been proposing various machine and deep learning approaches for network traffic analysis in different problem domains. However, it is also crucial to understand how these algorithms perform across the different domains. Hence in this research work we extend an analysis of diverse machine learning and deep learning techniques across three different problem domains: DDoS attack detection, Malicious URL detection and Tor traffic classification. We employ three publicly available datasets to train eight different machine learning and six deep learning models for both multi-class and binary classification in our comparative study. Our experiments show that Random Forest achieved superior performance compared to other machine learning models with F-measure of 92% for multi-class traffic classification and 100% for binary classification problems. For the deep learning models, Autoencoder with Random Forest achieved superior performance with an F-measure of 89% and 100% for multi-class and binary problems respectively.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Surveillance using Drones 无人机监视调查
Golla Uday Sai Theja, Motukoori Sai Murari, M. Singha, Ripon Patgiri, A. Choudhury
{"title":"A Survey on Surveillance using Drones","authors":"Golla Uday Sai Theja, Motukoori Sai Murari, M. Singha, Ripon Patgiri, A. Choudhury","doi":"10.1145/3549206.3549253","DOIUrl":"https://doi.org/10.1145/3549206.3549253","url":null,"abstract":"Drones are flying robots that can be remotely controlled. In this paper, we discussed different ways a drone can be used for surveillance. Drones are used to detect forest fires, manage traffic remotely, surveillance of crowds, etc. Drones make surveillance effective, accessible, and time-saving. Drones surveillance dearth the researcher’s conscientious, and therefore, we accumulate the associated literature and converse their realistic standpoint in general. This paper makes a specialty of video surveillance, the usage of drones in item detection and tracking, video summarization, continual tracking of the quarry, seek and rescue related operations in an adverse environment, traffic control in smart towns, and catastrophe control in a direful situation. This quick survey lock-up mild at the studies gaps.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing Banking Services Applicability Using Explainable Artificial Intelligence 利用可解释的人工智能分析银行服务的适用性
Anand Sriram, Sai Srivatsa Gorti, Eshaan Ganesh Amin, Amit Kumar
{"title":"Analyzing Banking Services Applicability Using Explainable Artificial Intelligence","authors":"Anand Sriram, Sai Srivatsa Gorti, Eshaan Ganesh Amin, Amit Kumar","doi":"10.1145/3549206.3549259","DOIUrl":"https://doi.org/10.1145/3549206.3549259","url":null,"abstract":"Over the last few years, the banking sector has had a pivotal role to play in the global economy, comprising of about 24% of the global GDP and employing millions of people worldwide. Banks have a wide array of products and services to offer, ranging from ATMs, Tele-Banking, Credit Cards, Debit cards, Electronic Fund Transfers (EFT), Internet Banking, Mobile Banking, etc. Machine learning is a method of data analysis that automates analytical model building and can be an essential decision support tool for banks in providing services to certain customers and to help in improving customer satisfaction and experience based on collected data. In this study, we made use of several machine learning models and Artificial Neural Networks (ANN) to help banks make predictions about timely customer loan repayment and customer satisfaction. We explored different machine learning algorithms and have performed SHAP analysis, which has helped make conclusions about the significant features driving these decisions.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"9 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
De-Fence: LoRa based Hop-to-Hop Communication 防御:基于LoRa的Hop-to-Hop通信
Anav Chaudhary, Maanas Talwar, Avil Goel, Gaurav Singal, Riti Kushwaha
{"title":"De-Fence: LoRa based Hop-to-Hop Communication","authors":"Anav Chaudhary, Maanas Talwar, Avil Goel, Gaurav Singal, Riti Kushwaha","doi":"10.1145/3549206.3549312","DOIUrl":"https://doi.org/10.1145/3549206.3549312","url":null,"abstract":"The need for a low-power reliable form of communication is ever-present in a multitude of fields. Our paper aims to develop and explore a security-oriented application of LoRa-based hop-to-hop communication, which provides low-power, large-scale, and long-range solutions to our current safety needs. It utilizes all the components of an IoT-based implementation, in to develop a network, which consists of different types of nodes. It takes input from the external environment through sensors, transports it via several intermediate nodes, using an effective routing algorithm, and provides output through the means of an actuator. The system achieved henceforth is highly scalable, reliable, portable, cheap, and easy to maintain, and provides a fresh outlook on the contemporary need of modernizing the security infrastructure using a growing non-cellular form of communication, LoRa technology.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114319959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predictive Model for Object Classification and Detection using Deep Learning 基于深度学习的目标分类和检测预测模型
P. Singh, R. Krishnamurthi
{"title":"Predictive Model for Object Classification and Detection using Deep Learning","authors":"P. Singh, R. Krishnamurthi","doi":"10.1145/3549206.3549265","DOIUrl":"https://doi.org/10.1145/3549206.3549265","url":null,"abstract":"In the agricultural field, there are large number of objects that roam inside the field and tend to develop an unfavourable condition that may damage the crop and degrades the production. Therefore, the possibility of unavoidable situation is very high which may result into loss of human resources, agriculture assets, financial loss, and crop damage. In this paper, tiny-YOLOv3 is used to classify and detect object in real time environment, however its performance is very high, but the accuracy degrades. Thus, an enhanced model is proposed by modifying the network architecture which amplifies the real time performance, processing speed and reduces processing time. The empirical conclusion shows that the proposed model gives approximately double precision, recall, IoU, mAP, compared to actual Tiny-YOLOv3 with an improvement of 69.01%. However, the testing is performed on multiple images which also demonstrates that the proposed model gives much higher result in comparison to Tiny-YOLOv3.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129784584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reward based Video Summarization using Advanced Deep Learning Architectures 使用高级深度学习架构的基于奖励的视频摘要
Jaya Gupta, Deepak Garg, V. Mishra
{"title":"Reward based Video Summarization using Advanced Deep Learning Architectures","authors":"Jaya Gupta, Deepak Garg, V. Mishra","doi":"10.1145/3549206.3549279","DOIUrl":"https://doi.org/10.1145/3549206.3549279","url":null,"abstract":"The goal of video summarization is to produce a short yet precise summary of the original video. Video summary is generated at the end of videos whilst a decision/action needs to be made at every single frame, reinforcement learning is the natural choice for such a job. Even the quality of visual features plays a crucial role in the summary generation, therefore we use advanced deep learning architecture ResNet50 for summarization task. Major contributions in this paper are feature extraction by creating a new dataset and utilizing the newly created dataset for video summarization task using reinforcement learning approach powered by ResNet50 architecture. The experimental results conducted on a benchmark dataset by utilizing a reward-based feedback mechanism achieve the gain of 5.24% for the F1 score in comparison to other state-of-the-art methods in video summarization.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"18 808 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kernel Extreme Learning Machine with Mixture Correntropy for Face Recognition 用于人脸识别的混合熵核极限学习机
Bhawna Ahuja, V. P. Vishwakarma
{"title":"Kernel Extreme Learning Machine with Mixture Correntropy for Face Recognition","authors":"Bhawna Ahuja, V. P. Vishwakarma","doi":"10.1145/3549206.3549260","DOIUrl":"https://doi.org/10.1145/3549206.3549260","url":null,"abstract":"In this article, a robust kernel extreme learning machine (KELM) framework is designed using mixture correntropy for recognition of facial images. KELM is augmentation of ELM with kernel learning concept, has attained excellent performance in acknowledging numerous classification and regression problems. Due to random projection technique and no requisite of number of hidden neurons specified beforehand, KELM achieves better generalization performance than ELM. Since KELM is designed on MSE paradigm for Gaussian theory of noise, its efficiency may decrease for non-Gaussian cases. To enhance the learning speed and robustness of KELM, this work develops a new KELM framework with mixture correntropy (KELM-MXC) that opts mixture correntropy (MXC) as the optimization paradigm, instead of MSE. Experiments on face databases are performed to prove the effectiveness and comparison analogy with related state-of-the-art algorithms are reported to demonstrate the performance excellence of the presented algorithm.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信