2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)最新文献

筛选
英文 中文
Face Detection for Real World Application 人脸检测在现实世界中的应用
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445287
D. Brar, Amit Kumar, Pallavi, Usha Mittal, Pooja Rana
{"title":"Face Detection for Real World Application","authors":"D. Brar, Amit Kumar, Pallavi, Usha Mittal, Pooja Rana","doi":"10.1109/ICIEM51511.2021.9445287","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445287","url":null,"abstract":"Face Detection has become a very prevalent issue in Machine Learning, not only in machine learning but in any field, one can think of. Due to this, it has gained a wide fan base and many people are working every day to improve the accuracy of object detection models using deep learning. But this improved performance comes at the price of increased computational overhead, which limits the ability of a machine learning model to be utilized on devices having small Graphical Processing Units. The core intent of this paper is to compare computation time for models such as Histogram of Oriented gradients (0.4 seconds) and ResNet (48.5 seconds) with BlazeFace (0.09 seconds), a model developed by google in the year 2020 and is a mobile device friendly model and fits well with real time application which need instant feedback and on top of that cannot handle bulky computations required for deep learning models","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"81 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120975298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analytical Review of Data Security in Cloud Computing 云计算中的数据安全分析综述
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445355
Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash
{"title":"Analytical Review of Data Security in Cloud Computing","authors":"Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash","doi":"10.1109/ICIEM51511.2021.9445355","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445355","url":null,"abstract":"All the organization wants to implement the same security parameters as they are already using with their internal data/resources. It is mandatory to understand and find the data protection challenges before outsourcing the data security in cloud computing. In present research we are discussing about the impact of security in cloud computing including all the challenges associated with it.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Comparative study of different denoising techniques on Brain NCCT images 脑NCCT图像不同去噪技术的比较研究
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445309
Simarjeet Kaur, Jimmy Singla, Nikita Nikita
{"title":"Comparative study of different denoising techniques on Brain NCCT images","authors":"Simarjeet Kaur, Jimmy Singla, Nikita Nikita","doi":"10.1109/ICIEM51511.2021.9445309","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445309","url":null,"abstract":"Medical images often get affected by noise and artifacts while acquisition techniques or patient’s movement. Some time radiologists unable to make useful and accurate conclusion from noisy images. The main aim of this study is to conduct a comparative measure of various denoising techniques such as Gaussian filter, Median filter, Bilateral filter, Non-Local Mean filter(NLM), Total Variation (TV) Anisotropic Diffusion (AD), BM3D method, on brain NCCT(Non-Contrast computed tomography) images. The prime focus of this research is to make comparative analysis of these techniques not merely to remove but also to preserve edges of brain NCCT images. The experimental results present that BM3D shows the best performance in terms of PSNR value, followed by total variation method and anisotropic diffusion method in terms of removal of noise. However marginal loss of edges and other fine details are there.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Precision Pig Farming Image Analysis Using Random Forest and Boruta Predictive Big Data Analysis Using Neural Network and K- Nearest Neighbor 基于随机森林的精准养猪图像分析和基于神经网络和K近邻的Boruta预测大数据分析
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445328
S. A. Shaik Mazhar, G. Suseendran
{"title":"Precision Pig Farming Image Analysis Using Random Forest and Boruta Predictive Big Data Analysis Using Neural Network and K- Nearest Neighbor","authors":"S. A. Shaik Mazhar, G. Suseendran","doi":"10.1109/ICIEM51511.2021.9445328","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445328","url":null,"abstract":"Conditions and monitoring for production are significant issues in livestock accuracy Agriculture, in which image measurement and smart data collection are required. Dynamical surveillance and review of this Article Man are suggested as a device for scientific identification and growth evaluation of pigs. The Watershed enhanced algorithm is adapted to each human animal's section in chronic occlusion, depending on the depth of the photos captured during flight Camera in the chosen area of interest. For swine's weight, the rate of development is calculated from the image-based calculations and predicted using a segmented linear fitting form. Related results will then be used to interpret and explain incidents. As real-time feedback to the farmers, it happens in the pig hen. Preliminary studies have demonstrated a high potential for precision farming methods for livestock farming to increase efficiency and animal health. In this paper, Machine Learning is used in IMAGE analysis using Random forest and boruta with Predictive Big Data analysis on the pig farming data using the neural network and k- nearest neighbor algorithm for advanced predictive data analysis of our pig farming agriculture.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125714686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond 5G: Reinventing Network Architecture With 6G 超越5G:用6G重塑网络架构
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445274
Zahid A. Bhat, Hamza Mushtaq, Jameel A. Mantoo, V. S. Yadav, Akash Kumar Shrivastava, Swati Swati
{"title":"Beyond 5G: Reinventing Network Architecture With 6G","authors":"Zahid A. Bhat, Hamza Mushtaq, Jameel A. Mantoo, V. S. Yadav, Akash Kumar Shrivastava, Swati Swati","doi":"10.1109/ICIEM51511.2021.9445274","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445274","url":null,"abstract":"The roll-out of 5G has begun in many parts of the world and ought to get completed by the end of 2021. However, given the ever-increasing bandwidth demand and need for automation, the existing capacity of even the most technologically advanced network architecture is expected to run out by 2030. The aim of this paper is to have a peep into the future of wireless communication and its associated technologies. With a higher transmittal rate, improved spectrum efficiency, greater connection proportions, a greater spectrum coherence, and much shorter latency, 6G is expected to revolutionize the digital world. This paper presents the findings of a detailed study regarding the construction of 6G. The main focus of this detailed survey is on the 6G along the lines of mobile communication and the key technologies likely to be fielded on 6G enable networks. Towards the end, this paper also presents ongoing research initiatives being carried out by various research organizations.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble method to predict impact of student intelligent quotient and academic achievement on placement 集成方法预测学生智商和学业成绩对分班的影响
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445323
Kanika Thakur, K. Lal, Vinay Kumar
{"title":"Ensemble method to predict impact of student intelligent quotient and academic achievement on placement","authors":"Kanika Thakur, K. Lal, Vinay Kumar","doi":"10.1109/ICIEM51511.2021.9445323","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445323","url":null,"abstract":"The study's aim is to see how academic achievement and student Intelligence Quotient influence placement. This paper will attempt to predict whether a student's intelligence quotient or academic score plays a significant role in placement. On a dataset of 193 students, we used a machine learning algorithm to compare the impact of student intelligence, behavior, and academic achievement on placement. We have used a Voting Classifier architecture to predict and classify the probability of a student being placed or not. The motivating force behind this research was to figure out why a group of students scoring the same marks in the same branch studying under the supervision of the same faculty are not able to fulfill the demands of an organization in order to be employed. The aim of this research was to combine conceptually different machine learning classifiers and predict the probability of a student being hired using a majority vote or the average expected probabilities. A classifier like this can be useful for balancing out the weaknesses of a group of models that are all performing well. Experiments show that student intelligence and attitude play a significant role in the recruiting process.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Key Management Scheme for Clustered Sensor Networks with Node Addition Support 支持节点添加的集群传感器网络动态密钥管理方案
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445393
Vipin Kumar, Navneet Malik
{"title":"Dynamic Key Management Scheme for Clustered Sensor Networks with Node Addition Support","authors":"Vipin Kumar, Navneet Malik","doi":"10.1109/ICIEM51511.2021.9445393","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445393","url":null,"abstract":"A sensor network is wireless with tiny nodes and widely used in various applications. To track the event and collect the data from a remote area or a hostile area sensor network is used. A WSN collects wirelessly connected tiny sensors with minimal resources like the battery, computation power, and memory. When a sensor collects data, it must be transferred to the control center through the gateway (Sink), and it must be transferred safely. For secure transfer of data in the network, the routing protocol must be safe and can use the cryptography method for authentication and confidentiality. An essential issue in WSN structure is the key management. WSN relies on the strength of the communicating devices, battery power, and sensor nodes to communicate in the wireless environment over a limited region. Due to energy and memory limitations, the construction of a fully functional network needs to be well arranged. Several techniques are available in the current literature for such key management techniques. Among the distribution of key over the network, sharing private and public keys is the most important. Network security is not an easy problem because of its limited resources, and these networks are deployed in unattended areas where they work without any human intervention. These networks are used to monitor buildings and airports, so security is always a major issue for these networks. In this paper, we proposed a dynamic key management scheme for the clustered sensor network that also supports the addition of a new node in the network later. Keys are dynamically generated and securely distributed to communication parties with the help of a cluster head. We verify the immunity of the scheme against various attacks like replay attack and node captured attacker. A simulation study was also done on energy consumption for key setup and refreshed the keys. Security analysis of scheme shows batter resiliency against node capture attack.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131441251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technology Progress and Availability Effect on Hungarian and Indian Student for Real-Time 技术进步和可用性对匈牙利和印度学生的实时影响
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445369
C. Verma, Z. Illés, Veronika Stoffová
{"title":"Technology Progress and Availability Effect on Hungarian and Indian Student for Real-Time","authors":"C. Verma, Z. Illés, Veronika Stoffová","doi":"10.1109/ICIEM51511.2021.9445369","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445369","url":null,"abstract":"In continuation of the unprecedented pandemic, we explored the impact of technology Development and Availability (DA) on the student’s mindset who belonged to heterogeneous continents (Asia and Europe). We followed the inference analysis with non-parametric tests: Kruskal-Wallis H, Welch’s T-test, Mann-Whitney U test on real samples. The students belonged to Indian and Hungarian higher education institutions. The results of each statistical test are self-evident about the technology DA disparity between Indian and Hungarian universities. Our presented differential approach might support the university’s student real-time response system to identify the impact on students.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Detection System for Health Care Units Using Raspberry PI 使用树莓派的医疗单位人脸检测系统
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445367
Pronaya Bhattacharya, Anand Handa, Mohd. Zuhair
{"title":"Face Detection System for Health Care Units Using Raspberry PI","authors":"Pronaya Bhattacharya, Anand Handa, Mohd. Zuhair","doi":"10.1109/ICIEM51511.2021.9445367","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445367","url":null,"abstract":"Computer vision has one of its primary applications as facial detection and recognition system, which can perform two essential functions of identifying and verifying an individual. An image capturing system with embedded computing as one of its significant parts extracts image information and requires no external processing system. To deliver results to other devices for the corresponding inputs, we use an interface device. The designed system is fast and efficient. It coordinates efficiently with the image recognition unit and the recognition algorithm. The system ensures a smooth flow of data stream between the two devices, namely, the Raspberry PI board and the camera. It also handles the data stream flow to occur smoothly between the camera and the Raspberry PI board. During this pandemic era, the application has a wide range of applicability for healthcare systems, helping in a contactless authentication of patients.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132890457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Machine Learning in Precision Agriculture using IoT 机器学习在物联网精准农业中的应用
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) Pub Date : 2021-04-28 DOI: 10.1109/ICIEM51511.2021.9445312
Sharvane Murlidharan, V. Shukla, A. Chaubey
{"title":"Application of Machine Learning in Precision Agriculture using IoT","authors":"Sharvane Murlidharan, V. Shukla, A. Chaubey","doi":"10.1109/ICIEM51511.2021.9445312","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445312","url":null,"abstract":"The demand for food has been increasing over the past six decades with the global population increase. Scientists have been finding different ways to meet this demand, such as; green revolution and genetically modified crop methods. These involve an unnatural technique to increase the yield, such as chemical fertilizers, pesticides, and modified seeds; these might be beneficial in the short term but might slowly disturb the internal body mechanism. In recent years, consumers are becoming more concerned about their food intake and prefer food with no adulteration and harmful pesticides. This has brought in the hype for a subdivision of framing, organic farming, where organic fertilizers and pesticides are used to retain the quality and nutrition values of the crop bring harvested. In organic farming, the right crop must be chosen according to the soil type and climate. This reduces the chance of pre-harvest crop losses caused by the abiotic stress in the environment, such as the soil pH levels, improper irrigation, climate, and temperature. However, when the desired conditions are provided to the crop, we can reduce the pre-harvest loss up to 35%. This paper offers a practical approach to reduce this loss by predicting what crop can be planted according to the present soil conditions and climate to prevent pre-harvest losses. The model involves a temperature and humidity sensor, a soil moisture sensor, a soil pH sensor, IoT, and a water pump under a greenhouse environment connected with the help of a development board, Raspberry pi, and machine learning techniques.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130744563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信