2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)最新文献

筛选
英文 中文
Integrated Product-Process Design: Conceptual Framework for Data Driven Manufacturing Resource Selection 集成产品-工艺设计:数据驱动制造资源选择的概念框架
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787394
Uzair Khaleeq uz Zaman, Mujtaba Rafique Ghoto, A. Siadat, A. Baqai, A. B. Aqeel, Usman Qamar
{"title":"Integrated Product-Process Design: Conceptual Framework for Data Driven Manufacturing Resource Selection","authors":"Uzair Khaleeq uz Zaman, Mujtaba Rafique Ghoto, A. Siadat, A. Baqai, A. B. Aqeel, Usman Qamar","doi":"10.1109/ICoDT255437.2022.9787394","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787394","url":null,"abstract":"With the extensive development of new technologies and the application of information in the manufacturing industry, immense volumes of distinct data are being generated and collected daily. However, this data is largely unusable as its not meticulously cleaned and processed. The effective utilization of such complex data is the cornerstone of data analytics, as successful analysis leads to useful, relevant, and actionable knowledge, which in the long run can prove to be revolutionary for any field and open new avenues. Although the application of data analytics in areas such as sales & marketing, healthcare, cybersecurity, and climate change is largely prevalent, the implementation of data analysis and its tools for efficient product & process design is an unexplored opportunity with large volumes of data generated by major stakeholders throughout the manufacturing and product-process design activity remaining underutilized. This paper, therefore, defines a novel conceptual framework that applies data analysis to integrated product-process design (IPPD) for weighted data-driven IPPD that amalgamates data generated from multiple streams. Primarily from the user perspective, supply chain network, current & upcoming technological processes, and competitor process and product designs, will be utilized. The proposed framework can be further used to create new products better aligned with customer requirements, enhance the overall quality of the product, improve production efficiency through new technological advancements, support the supply chain network, and give the applicant industry a competitive advantage against its competitors.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122755208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for Dynamic Partial Configuration of Algorithms for Zynq-7000 SoC using JPEG as Case Study Zynq-7000 SoC算法动态部分配置框架,以JPEG为例
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787460
Muhammad Usama Iqbal, Sajid Gul Khawaja, S. Khan, A. Shaukat
{"title":"Framework for Dynamic Partial Configuration of Algorithms for Zynq-7000 SoC using JPEG as Case Study","authors":"Muhammad Usama Iqbal, Sajid Gul Khawaja, S. Khan, A. Shaukat","doi":"10.1109/ICoDT255437.2022.9787460","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787460","url":null,"abstract":"The ability of the Field Programmable Gate Arrays (FPGAs) to reconfigure themselves makes them stand out and a preferred choice while designing an embedded system. The basic hardware architecture of FPGAs is the reason behind the availability of this unique feature. Most of the SRAM-based FPGAs supports partial reconfiguration (PR) feature. Many complex algorithms can be implemented using dynamic partial reconfiguration on FPGAs while occupying minimum possible area. Many applications implemented on FPGAs do not execute in a parallel fashion where different modules of the application are implemented over dedicated part of the hardware. Most of the time these modules are dependent on each other’s result therefore they cannot execute in parallel and leave a big amount of the FPGA area sitting idle most of the execution period. We propose a framework based on Dynamic partial reconfiguration, which allows scheduling the execution of multiple logic designs over the same area of FPGA fabric. In order to validate the proposed methodology, JPEG compression has been implemented as a case study Zynq-7000 SOC using both proposed framework and a single static implementation. In addition, the effectiveness of the proposed methodology is quantified by comparing the FPGA resource utilization of the original JPEG compression engine design and that of the partial re-configurable prototype. The results indicate a significant reduction in hardware resource utilization where 34%, 39% and 66% reduction has been achieved in Slice LUTs, Slice Registers and DSP blocks respectively.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power profiling-based side-channel attacks on FPGA and Countermeasures: A survey 基于功率分析的FPGA侧信道攻击及对策综述
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787473
Ali Hasnain, Yame Asfia, S. G. Khawaja
{"title":"Power profiling-based side-channel attacks on FPGA and Countermeasures: A survey","authors":"Ali Hasnain, Yame Asfia, S. G. Khawaja","doi":"10.1109/ICoDT255437.2022.9787473","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787473","url":null,"abstract":"In recent years, there are many attacks revealed that can extract secret information from systems. These attacks are so powerful and serious threat to the security of systems. The side-channel attacks which use the power leakage of the cryptographic circuit during performing any operation to obtain a secret key are called power-based side-channel attacks. In this paper, we present a novel definition to explain these attacks, we present the difference between physical and remote power profiling methods and attacks. For our survey, we collect the more related and main information contained about power profiling-based attacks for purpose of a better literature survey. For the prevention of these attacks, we present the countermeasures based on masking and hiding techniques. We also present a brief discussion on attacks and their countermeasures.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analytic Hierarchy Process for urban heat stress mitigation 城市热应力缓解的层次分析法
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787426
A.M. Qureshi, A. Rachid
{"title":"An Analytic Hierarchy Process for urban heat stress mitigation","authors":"A.M. Qureshi, A. Rachid","doi":"10.1109/ICoDT255437.2022.9787426","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787426","url":null,"abstract":"In this study, an Analytic Hierarchy Process based approach is proposed for the selection of heat stress prevention measures. This approach provides decision makers with an easy way to evaluate the criteria that help the decision-making process in choosing appropriate measures for hotspots. The study focuses on the key pre-criteria before implementing an intervention. The proposed scheme is based on a comparison between the interventions to show the importance of the alternatives. The evaluation of the measures is obtained from a questionnaire where human judgment is used for a comparison, based on their perception and priorities. The final results showed that green roof is most beneficial option for heat stress mitigation with respect to criteria taken into account.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"11 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical flow estimation technique for hazy scenes 朦胧场景光流估计技术
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/icodt255437.2022.9805761
Rao Kashif, Sana Rao
{"title":"Optical flow estimation technique for hazy scenes","authors":"Rao Kashif, Sana Rao","doi":"10.1109/icodt255437.2022.9805761","DOIUrl":"https://doi.org/10.1109/icodt255437.2022.9805761","url":null,"abstract":"Hazy scenes limit the visibility and make the optical flow estimation task challenging due to low contrast images. Previous methods are not robust when applied to hazy image sequences because the two assumptions (brightness constancy and smoothness) break down due to the low contrast outdoor effects. Based on the pre-processing work on images, we applied an image dehazing method on image sequences first to handle haze and then estimated optical flow. The proposed method is based on a classical pyramidal technique. Results show that our method performs well on hazy scenes as compared to the other existing method.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133731208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crop and Weeds Classification in Aerial Imagery of Sesame Crop Fields Using a Patch-Based Deep Learning Model-Ensembling Method 基于斑块深度学习模型集成方法的芝麻田航空影像作物和杂草分类
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787455
S. I. Moazzam, U. S. Khan, Tahir Nawaz, W. S. Qureshi
{"title":"Crop and Weeds Classification in Aerial Imagery of Sesame Crop Fields Using a Patch-Based Deep Learning Model-Ensembling Method","authors":"S. I. Moazzam, U. S. Khan, Tahir Nawaz, W. S. Qureshi","doi":"10.1109/ICoDT255437.2022.9787455","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787455","url":null,"abstract":"Sesame (Sesamum indicum L.) is an important commercial and food crop, and its yields is limited by many insects, pests, diseases, and weeds. Autonomous aerial agrochemicals spray application on sesame fields using a drone aims to save crop from these yield limiting factors and in addition agrochemicals application quantity and site could be controlled, and human health is expected to be protected. For accurate and selective spray application, autonomous systems would need some parameters to distinguish between crop, weed and background. In this research an aerial sesame field dataset has been collected with the focus to classify patch areas of sesame and weeds present in the field. Dataset was captured using Agrocam. We have developed a patch image-based classification approach along with a novel SesameWeedNet convolutional neural network (CNN) inspired by the layer’s configuration of VGG networks and depth-wise convolutions of the MobileNet. The small model contains 6 convolutional layers, and it runs faster and accurately on small patch images. Our approach breaks 1920×1080-pixel images into smaller patch images of size 45×45 pixels. After that, these small patch images are fed to a relatively small CNN for training, validation, and finally for classification. Patch based model ensemble and dataset grouping are two major parts in our methodology. Our system recommends the dataset grouping according to vegetation present in the images to enhance classification results. We have achieved accuracy up to 96.7% with our proposed method. We have tested our system under sunlight variation, in wet and dry soil conditions and at different growth stages. To the best of our knowledge, no attempt has been made to classify and treat crop and weeds in sesame fields at the post-emergence stage previously. In this research we have made the contribution of aerial sesame-weed dataset and a complete deep learning-based approach to classify weeds in sesame fields under variable lighting conditions.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
File Integrity Checkers: Functionality, Attacks, and Protection 文件完整性检查器:功能,攻击和保护
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787428
A. Salman, Muhammad Sohaib Khan, Sarmad Idrees, F. Akram, Muhammad Junaid, A. Malik
{"title":"File Integrity Checkers: Functionality, Attacks, and Protection","authors":"A. Salman, Muhammad Sohaib Khan, Sarmad Idrees, F. Akram, Muhammad Junaid, A. Malik","doi":"10.1109/ICoDT255437.2022.9787428","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787428","url":null,"abstract":"Intrusion detection systems are a critical component of a network's security. Intrusion detection systems exist in a variety of shapes and sizes, with various methodologies and analytic procedures. Host-based intrusion detection systems, or HIDS, are intrusion detection systems that operate at the host level and use a signature database (DB) or a profile to do detection analysis. The integrity of the database is fully dependent on the detection in all host-based systems. If an attacker can edit the database to his liking, he can simply circumvent the HIDS. In this paper, we have focused our study on file integrity checking HIDS. An endeavor has been made to study this specific type of HIDs functionality and various attacks against its trusted operation. Different techniques used to secure the system database have been studied, however, none are found to be flawless. We conclude that the use of Blockchain can be a viable solution in the future to secure the critical database integrity in such systems.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analytic Hierarchy Process for urban heat stress mitigation 城市热应力缓解的层次分析法
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787481
A.M. Qureshi, A. Rachid
{"title":"An Analytic Hierarchy Process for urban heat stress mitigation","authors":"A.M. Qureshi, A. Rachid","doi":"10.1109/ICoDT255437.2022.9787481","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787481","url":null,"abstract":"In this study, an Analytic Hierarchy Process based approach is proposed for the selection of heat stress prevention measures. This approach provides decision makers with an easy way to evaluate the criteria that help the decision-making process in choosing appropriate measures for hotspots. The study focuses on the key pre-criteria before implementing an intervention. The proposed scheme is based on a comparison between the interventions to show the importance of the alternatives. The evaluation of the measures is obtained from a questionnaire where human judgment is used for a comparison, based on their perception and priorities. The final results showed that green roof is most beneficial option for heat stress mitigation with respect to criteria taken into account.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey On Prevalent Approaches To Predict The Popularity Of Social Content 预测社会内容流行程度的常用方法综述
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787430
A. Shahid, M. Akram, Anum Abdul Salam, Jahan Zeb
{"title":"A Survey On Prevalent Approaches To Predict The Popularity Of Social Content","authors":"A. Shahid, M. Akram, Anum Abdul Salam, Jahan Zeb","doi":"10.1109/ICoDT255437.2022.9787430","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787430","url":null,"abstract":"The destiny of social media images depends upon their popularity: some of the uploaded images/videos get a lot of fame among people while others just get completely unnoticed. Why is this so? This survey paper addresses this question and discusses all the features related to an image/video that are responsible for its popularity among people. Their must be some common features in the images/videos that gets fame, if we get to learn the pattern or features that are responsible for the fame then we can predict if media will get fame or not before actually uploading the media on social media platforms. The prediction of engagement level for an image can be used by companies to improve their marketing strategies. This can be very useful to target the right audience sagaciously, manage the resources efficiently and make strategical decisions. In this survey paper, different prevalent methodologies are discussed that are used by researchers in the past, the techniques they have used to predict the popularity score of an image for a specific number of days and the types of features they have used. This survey paper manifest that the features related to the image context outperforms the features related to image content.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128253432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Machine Learning Algorithms to Detect Dysplasia in Barrett's Esophagus 使用机器学习算法检测Barrett食管发育不良
2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2) Pub Date : 2022-05-24 DOI: 10.1109/ICoDT255437.2022.9787479
S. Hayat, Faisal Rehman, Naveed Riaz, Hana Sharif, Sadaf Irshad, Shahid Shareef
{"title":"Using Machine Learning Algorithms to Detect Dysplasia in Barrett's Esophagus","authors":"S. Hayat, Faisal Rehman, Naveed Riaz, Hana Sharif, Sadaf Irshad, Shahid Shareef","doi":"10.1109/ICoDT255437.2022.9787479","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787479","url":null,"abstract":"Machine learning is a division or branch of mathematical models that are used to learn data to generate computerized algorithms. This concept could be a predictive model. Machine learning is part of the learning key function that can predict other noisy data. One possible method is to separate the two types according to the features of the measurement content. These models can be used to cause people associated with the disease. In our research, different algorithms are applied to the data set to correctly predict dysplasia. This opens the door to standardized training and qualitative analysis steps for staff performing endoscopy in Barrett's esophagus. In this study, Five classification techniques were used in the implementation of principal component analysis, e.g. K-Nearest Neighbors, SVM (Support Vector Machines). The basic goal is to measure the exact value of information about output and feasibility, with each evaluation being for accuracy, recall, and specificity. The exploratory output shows the support of vector analysis with PCA. The single score for the K neighbor (0.97) and the SVM value is 0.91.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信