2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)最新文献

筛选
英文 中文
A Review on Breast Imaging Modalities based on Technical Aspects 基于技术方面的乳腺成像方式综述
Sudharsana Vijayan, P. Radhika, T. Roshini
{"title":"A Review on Breast Imaging Modalities based on Technical Aspects","authors":"Sudharsana Vijayan, P. Radhika, T. Roshini","doi":"10.1109/ICICICT54557.2022.9917854","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917854","url":null,"abstract":"Most common invasive cancer in female is Breast cancer and rarely, it will be affected in men also. From the several studies found that the second leading cause of cancer death is breast cancer in women after lung cancer. The Breast cancer occurs when the cells in the breast grow and divide that cell in an uncontrolled way. Due to this cell creating a mass of tissue in the breast itself is called tumor or mass. Signs of breast cancer are seeing changes of skin on a breast, feeling a lump in a breast and size change of breast etc. If the breast cancer/ mass detected at the early stage or at initial stage, then the survival rate of patient will be improved. In this review, several modalities have been introduced to detect the breast cancer. Furthermore some of the output parameters of these modalities have been investigated. Based on various imaging modalities, were selected around 40 articles by using search engines. And studied the selected papers thoroughly and categorize the results based on modalities which have been used. The used Breast cancer imaging techniques are Mammography, Ultrasound, CT scan, MRI and PET scan etc. The modality selection has been completely depends on the patient’s like current state of cancer tissue and density, age of the patient etc.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Blockchain and 5G: Advantages and Challenges of Decentralization 区块链与5G的融合:去中心化的优势与挑战
Dhruv Kumar, Dhruv Kashyap, Deepak Kumar Mishra, Pawan Singh Mehra
{"title":"Integrating Blockchain and 5G: Advantages and Challenges of Decentralization","authors":"Dhruv Kumar, Dhruv Kashyap, Deepak Kumar Mishra, Pawan Singh Mehra","doi":"10.1109/ICICICT54557.2022.9917645","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917645","url":null,"abstract":"Trusted Third Parties or TTPs are used throughout applications for transactions, verifications and aims to provide customers with a set of convenient features. We provide certain challenges that are being faced by TTP based applications. Further we discuss about certain issues with the present 5G and beyond modelling based on TTPs. Then we discuss about some highlight characteristics and the need for decentralized Blockchain based systems. The Blockchain technology assists parties to synchronize, verify and preserve the contents of applications in a positive manner. Through this paper, we plan to lay out a review perspective on the decentralization based Blockchain technology usage in 5G and beyond networks.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solar Cogeneration in India: Current Situation and Future Prospects 印度太阳能热电联产:现状与未来展望
Dhawan Singh, A. Singh, Aditi Thakur
{"title":"Solar Cogeneration in India: Current Situation and Future Prospects","authors":"Dhawan Singh, A. Singh, Aditi Thakur","doi":"10.1109/ICICICT54557.2022.9918001","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9918001","url":null,"abstract":"With the substantial rise in energy demands, there has been a surge of interest in a blend of sustainable power assets and battery stockpiling gadgets for the inventory of high caliber and consistent electrical force. The current research work presents a systematic review towards the age of multi-megawatt energy utilizing cross-breed energy frameworks for the generation of solar, wind and hybrid energy. It talks about solar, wind, and a mixture of both power frameworks for the industrial, commercial, and electric utility sectors. Furthermore, this mixture model uses sun-based cogeneration innovation for gathering sun-based energy and wind-based cogeneration are utilized for the age of wind power generation. Thus, a blend of both of these will expand the proficiency of this crossover framework that can be utilized to provide reliable energy to households.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127602824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A review of DC DC converters for renewable energy and EV charging applications DC - DC转换器在可再生能源和电动汽车充电中的应用综述
Aleena Joseph, S. S., Alan Mathew George
{"title":"A review of DC DC converters for renewable energy and EV charging applications","authors":"Aleena Joseph, S. S., Alan Mathew George","doi":"10.1109/ICICICT54557.2022.9917935","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917935","url":null,"abstract":"DC-DC converters are integral part of electric vehicles and PV systems. The modifications applied on the configuration in these converters will improve overall performance of the system. This paper present overview of various converter topologies used for renewable and EV charging applications and also put forward the best among that in terms of lesser ripple current and higher efficiency. From the comparison study, a high gain quasi resonant SEPIC converter is considered as the superior one for renewable energy applications. To improve the voltage conversion ratio, it uses a voltage multiplier combined with passive clamp circuit and coupled inductor. The converter is free from power dissipations due to soft switching feature. Thus, the proposed converter can provide higher voltage gain and efficiency.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Systematic Review on Recent Techniques for the Detection of Multiple Myeloma 多发性骨髓瘤最新检测技术的系统综述
Shinu Mm, D. Pamela, S. J, G. Devadhas
{"title":"A Systematic Review on Recent Techniques for the Detection of Multiple Myeloma","authors":"Shinu Mm, D. Pamela, S. J, G. Devadhas","doi":"10.1109/ICICICT54557.2022.9917638","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917638","url":null,"abstract":"Multiple myeloma is a kind of blood cancer caused by the uncontrolled clonal proliferation of malignant plasma cells, which results in decreased hematopoiesis, increased monoclonal protein synthesis, bone tissue destruction, and renal system changes leading to kidney failure. The purpose of this article is to discuss recent Techniques for the Detection of Multiple Myeloma. The many methods of detection as well as the recent developments in technological methods of detection have been reviewed and summarised. Using search engines, about 18 articles were chosen based on different ways to find them. And carefully read the chosen papers and put the results into groups based on the methods that were used. Multiple myeloma treatments include magnetic resonance imaging (MRI), bone marrow testing, computed tomography (CT), and biopsies, among others.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HRPA: Human Resource Prediction Analytics HRPA:人力资源预测分析
Shweta Pandey, Jalpa Mehta
{"title":"HRPA: Human Resource Prediction Analytics","authors":"Shweta Pandey, Jalpa Mehta","doi":"10.1109/ICICICT54557.2022.9917576","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917576","url":null,"abstract":"Each company tries its hardest to make the best use of its employees in order to accomplish the business's profitability. However, they encounter a number of issues unique to their best employees, which is frequently where people analytics comes into play. Day-to-day operations, procedural efficiencies, and other strategic operational challenges are handled by HR analytics. As a result, HR analytics considers all components of an organization at a high level, whereas work force analytics concentrates on personnel data such as engagement, job satisfaction, and success. The wide category of HR analytics includes labor force analytics. Employees leave for a number of reasons, including dissatisfaction with their pay, stagnant career advancement, and so on. A great defeat is possible for a firm to be profitable not just in terms of money, but also in terms of losing valuable employees. If the company determines whether or not that employee should be promoted, predicts what proportion of earnings that employee should receive, and determines whether or not that employee will leave the company in the near future, the company will work on employee retention in advance to keep their valuable and hardworking employees. Machine learning approaches might be used to forecast staff turnover and retention. Each modern organization accumulates a wide range of employee data; We'll utilize this data, analyze it, and extract insights from it so that the firm can make better decisions about how to conduct employees job.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Based Detection of Diabetic Retinopathy using Retinal Fundus Images 基于深度学习的视网膜眼底图像检测糖尿病视网膜病变
C. Kumari, A. Hemanth, Veda Anand, D. Kumar, R. Naga Sanjeev, T. S. Sri Harshitha
{"title":"Deep Learning Based Detection of Diabetic Retinopathy using Retinal Fundus Images","authors":"C. Kumari, A. Hemanth, Veda Anand, D. Kumar, R. Naga Sanjeev, T. S. Sri Harshitha","doi":"10.1109/ICICICT54557.2022.9917709","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917709","url":null,"abstract":"Diabetic retinopathy is a type of diabetes which affects the eye by causing damage to retinal blood vessels. It may have no symptoms at first or cause diminished vision problems. As the condition deteriorates, it affects both eyes, leading to partial or complete loss of vision. This is especially so when blood sugar levels are uncontrollable. As a result, the diabetic patient is at greater risk for developing this condition. The risk of complete and permanent blindness can be avoided if an early detection is made. As a result, effective screening method is required. In this paper the four salient features microaneurysms, blood vessels, hemorrhages and exudates are drawn out from the unprocessed images using image-processing techniques and convolutional neural network is used for automatic identification and it implements fundus images classification of Diabetic Retinopathy. The pre-trained CNNs use DenseNet-169. The transferred CNNs are then fine-tuned using the fundus images. Pre-trained CNN models were considered as feature extractors for fundus pictures. As features, the outputs of the final fully connected layers are used. By using DenseNet-16 the highest accuracy is obtained compared to remaining models. The ensuing result displays visual examples as well as images of the corresponding DRIVE database basic facts. The model is further trained with a Conv2 layer with 128 filters to improve accuracy, and greater integration is used to obtain an accuracy of 80%.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133997294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Otsuka Ochiai Energy Efficient and Probabilistic Extreme Load Balancing for WSN Assisted IoT WSN辅助物联网的能效和概率极端负载均衡
S. Rani, K. Sankar
{"title":"Otsuka Ochiai Energy Efficient and Probabilistic Extreme Load Balancing for WSN Assisted IoT","authors":"S. Rani, K. Sankar","doi":"10.1109/ICICICT54557.2022.9917772","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917772","url":null,"abstract":"In the current era, both Internet of things (IoT) and Wireless Sensor Networks (WSNs) are said to be the paramount operational coercion for technology advancements. However, when load conditions dynamically fluctuate, an imbalance load between sensors. In this paper, we propose an energy-efficient data aggregation and load balancing for reliable WSN assisted IoT communication called, Otsuka Ochiai Energy-efficient and Probabilistic Extreme Load Balancing (OOE-PELB). Otsuka-Ochiai Energy-efficient Data Aggregation is applied for performing optimal clustering and selecting the energy-efficient cluster head to reduce data aggregation time. Next, Probabilistic Extreme Learning Machine Load Balancing model is applied for precise and reliable WSN assisted IoT communications. The performance of the proposed method is evaluated by extensive simulations. The simulation results reveal that it outperforms the existing state-of-the-art methods in terms of energy efficiency, data aggregation time and network lifetime.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning based human body temperature measurement and mask detection by thermal imaging 基于机器学习的人体体温测量和热成像面具检测
A. M., G. Udupa
{"title":"Machine learning based human body temperature measurement and mask detection by thermal imaging","authors":"A. M., G. Udupa","doi":"10.1109/ICICICT54557.2022.9917903","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917903","url":null,"abstract":"The worldwide impact of the COVID-19 epidemic has been immense. Economic, educational, industrial, and other sectors all took a hit as a result of COVID-19. Unaware of how to address this, the health care industry was also hit. In the absence of a known cure, the most effective way to slow the spread of this fatal illness is to wear a face mask when doing so. Wearing a face mask when in public or conversing with people is also mandated by the WHO. Additionally, the most common symptom is high fever, which occurs in those who are unwell with this condition. As a result, we describe a system that can distinguish face masks using a regular RGB camera and identify persons with high body temperatures using a thermal camera with an 80x60 resolution. Tracking safety violations and encouraging the use of face masks may be achieved by using this method.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage 为安全云存储启用基于身份的完整性审计和敏感信息隐藏的数据共享
Asha S, P. K, Tanmay Joshi
{"title":"Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage","authors":"Asha S, P. K, Tanmay Joshi","doi":"10.1109/ICICICT54557.2022.9917653","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917653","url":null,"abstract":"With the increase in the data growth, where data storage becomes difficult if the user wants to store it on a local drive, which is why many organizations and people prefer storing their data on a cloud storage. With accessibility of cloud storage, people can remotely use cloud storage and avail data storage. Remote data integrity has been suggested as a way to ensure the integrity of data stored in clouds. The health care system is one example of cloud storage, and the cloud file there may include sensitive data. This sensitive information should not be shared with others. One solution would be to encrypt the whole file to avoid sensitive data sharing, but then this way the file would be unusable to others. The method for implementing data sharing with sensitive information disguised in remote data integrity audits is one topic that hasn't been looked into yet. This technique does this by creating a sanitizer that will clean up data blocks that correspond to the sensitive information in the file and change those signatures into valid ones for the cleansed file. These signatures are utilised during the integrity auditing procedure to confirm the cleaned-up file. As a result, this scheme allows files to be shared with others, while also maintaining data security by sanitizing blocks of sensitive data, with the data integrity auditing still able to be executed efficiently without any problems. Identity-based cryptography, which the proposed solution is built on, makes complex certificate administration simple. The proposed method is efficient and secure, according to the performance analysis and security analysis.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115598343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信