2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)最新文献

筛选
英文 中文
A Review of Flood Forecasting with the Motivation of Avoiding Economic Loss 以避免经济损失为动机的洪水预报研究述评
M. V. Lakshmi, Reeja S R
{"title":"A Review of Flood Forecasting with the Motivation of Avoiding Economic Loss","authors":"M. V. Lakshmi, Reeja S R","doi":"10.1109/CCIP57447.2022.10058641","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058641","url":null,"abstract":"Flooding is more than a momentary influx of water onto ordinarily dry terrain. Floods are the most frequent natural calamities in certain states, like Assam, Kerala, Tamil Nādu, and Bangladesh. As per the IPCC-2022 third report, mostly 44 percent of environmental disasters globally are reported yearly, flash floods represent 22 percent of all economic damages globally, and the severity of death rate is about 10 percent worldwide. Failing to evacuate flooded regions or coming into flood waters can result in harm or death. By utilizing the different correlated data, such as the availability of water from all resources, including canals, rivers, glaciers, precipitation in that area, and past rainfall data the prediction will be accurate. This survey is related to flood forecasting (FF) based on precipitation and water obtainability index (WOI) using machine learning (ML) and deep learning. Deep Learning (DL) has become an evolutionary and adaptable technique that revolutionizes business applications and produces new and improved model creation and scientific discovery capabilities. although dl adoption in hydrology has so far been sluggish, the time is now right for innovations.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Based Advanced Electric Vehicle Charging Infrastructure 基于物联网的先进电动汽车充电基础设施
J. Surendiran, R. Reenadevi, R. G. Vidhya, S.S. Sivasankari, B. P. Pradeep Kumar, N. Balaji
{"title":"IoT-Based Advanced Electric Vehicle Charging Infrastructure","authors":"J. Surendiran, R. Reenadevi, R. G. Vidhya, S.S. Sivasankari, B. P. Pradeep Kumar, N. Balaji","doi":"10.1109/CCIP57447.2022.10058649","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058649","url":null,"abstract":"In this paper, an intelligent process-based design is used to create and manage Electric Vehicle (EV) charging processes. Because of the limitations of electrical power distribution, charging electric vehicles must be done efficiently. The recommended smart electric vehicle charging station has modern features such as the ability to switch sources automatically based on the availability of each source while still maintaining power from many sources. We are employing three sources in this implementation: the solar system, the wind system, and the main supply. The controller will switch the source automatically depending on its relevance. Users of the IOT Thing Speak cloud service will be able to view the number of available slots. In this paper, an intelligent process-based design is used to create and manage Electric Vehicle (EV) charging processes. Because of the limitations of electrical power distribution, charging electric vehicles must be done efficiently. The recommended smart electric vehicle charging station has modern features such as the ability to switch sources automatically based on the availability of each source while still maintaining power from many sources. We are employing three sources in this implementation: the solar system, the wind system, and the main supply. The controller will switch the source automatically depending on its relevance. Users of the IOT Thing Speak cloud service will be able to view the number of available slots.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Segmentation and Counting of Red Blood Cells in Hepatitis B Patients 乙型肝炎患者红细胞图像分割与计数
Rajesh Gundlapalle, B. Saroja, A. B. Gurulakshmi, Sanjeev Sharma
{"title":"Image Segmentation and Counting of Red Blood Cells in Hepatitis B Patients","authors":"Rajesh Gundlapalle, B. Saroja, A. B. Gurulakshmi, Sanjeev Sharma","doi":"10.1109/CCIP57447.2022.10058676","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058676","url":null,"abstract":"Human blood contains RBCs, WBCs, platelets, and plasma. The counting of blood cells is important since it shows one's overall health. Counting Blood Cells encompasses all of the cells required to evaluate a person's health and diagnose illnesses. A lack of red blood cells (RBC), which account for 99 percent of all blood cells, causes a number of blood disorders. The typical wait time for blood results and reports in today's hospitals and clinical laboratories is currently 24 hours in cases of high-severity diseases with high mortality rates. For high-risk diseases such as hepatitis B, doctors and healthcare technicians advise patients to wait as little as possible and to begin treatment as soon as possible. The process starts with picture acquisition and image enhancement, which reduces noise in photos while preserving the edges, before converting them to binary images and separating the region of interest from the background. RBC is separated from the other blood components during the segmentation process. The blood image is morphologically treated before RBC counting is performed using the Hough transform, a powerful image segmentation technique.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114461120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Data Security with Intersection of AI and Blockchain 人工智能与区块链交叉的数据安全研究
Vikhyath K B, Sheetal Shivaraj Kubsad, Sunidhi A G
{"title":"Survey on Data Security with Intersection of AI and Blockchain","authors":"Vikhyath K B, Sheetal Shivaraj Kubsad, Sunidhi A G","doi":"10.1109/CCIP57447.2022.10058639","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058639","url":null,"abstract":"The two major trends of today's tech world are artificial intelligence (AI) and blockchain. These include the advancement in machine translation, computer vision, processing and generation of natural language and handling of massive datasets. The integrated structure of AI & blockchain provide users with innovative data models and results in improved authenticity on data. This technology is largely playing a disruptive role in every industry - banking, manufacturing, real estate, education, healthcare, governance and entertainment. This paper gives a detail on the data security issues, defensive mechanisms, tools and simulation environments with intersection of AI and Blockchain.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134262176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evidence Acquisition in Social Media for Cyber Crime 社交媒体对网络犯罪的证据获取
Varsha Pawar, Deepa V. Jose
{"title":"Evidence Acquisition in Social Media for Cyber Crime","authors":"Varsha Pawar, Deepa V. Jose","doi":"10.1109/CCIP57447.2022.10058653","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058653","url":null,"abstract":"Social Media forensics a branch of forensics involves in collecting the evidences for the cyber crime. Investigating social media is a complex process which involves the privacy issues for accessing the users, suspects and victims information on social media. Manual processing of social media data is not feasible as it contains large volumes of data. An automated process is needed to incident specification, evidence extraction and for provenance. The need for handling heterogeneity of data as users have accounts with multiple social websites is also explained. This study briefs the existing models and the challenges faced in analyzing with those models. The research goals in this field are also addressed. A pool of tools which can contribute in guarding the solution for cyber crime is also presented.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"8 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Framework for Cyber Security Attacks on Cloud-Based Services 基于云的服务网络安全攻击的新框架
B. N, Pradeepa K, Murugesan S, H. S, Vinoth Kumar M, Veeramanickam Mrm
{"title":"A Novel Framework for Cyber Security Attacks on Cloud-Based Services","authors":"B. N, Pradeepa K, Murugesan S, H. S, Vinoth Kumar M, Veeramanickam Mrm","doi":"10.1109/CCIP57447.2022.10058673","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058673","url":null,"abstract":"Particularly when creating cloud apps and web services, the cybersecurity of cloud services plays a crucial role. Use of the internet is required for cloud computing; Consequently, there is constant pressure to compromise the security of its services. A malicious attempt to cause harm is made by a distributed denial of service (DDoS) attack, by overrunning it with internet traffic, the targeted cloud's regular traffic is reduced. The security of cloud computing is severely hampered because of this. All types of DDoS attacks are introduced as an approach of cybersecurity for protecting the cloud and its services introduced in this paper, to assess how well the proposed algorithm works and performs, by examining the relationship between legitimate and malicious traffic. In terms of specificity, precision, and sensitivity, the researcher assessed the performance of the proposed approach. To defend against DDoS attacks when using cloud services, the experiments' results were very positive feedback. For preventing DDoS attacks, with an average specificity of 97.39%, a regular sensitivity of 92.31%, a typical accuracy of 96.53%, and a usual performance of 95.41%, promising results came from the tests.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CNN-Based Video Surveillance for Fire and Localization Detection 基于cnn的火灾视频监控与定位检测
Sudharani, R. Shirwaikar, Lincy Mathews
{"title":"CNN-Based Video Surveillance for Fire and Localization Detection","authors":"Sudharani, R. Shirwaikar, Lincy Mathews","doi":"10.1109/CCIP57447.2022.10058625","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058625","url":null,"abstract":"Convolutional neural networks (CNNs) have shown success in picture classification and other computer vision issues. The use of CNN in the fire recognition technique will greatly enhance detection accuracy, resulting in fewer fire tragedies and societal and environmental consequences. However, as inference requires a lot of memory and computing power, a significant problem is implementing CNN-based fire sensing devices in an actual video network. We describe a new, energy-efficient, Fire detection, location, and semantic understanding using a computationally efficient CNN architecture scenario based on the Squeeze Net design. It applies compact convolutional kernels and avoids huge, completely linked layers to save computational load. Despite its minimal processing requirements, results of the experiment show that our suggested approach achieves accuracy = 99.7%, F1-score = 98.49%, Precision = 98.99%, and Recall = 98.00%. Furthermore, by considering the specific characteristics of the circumstance at hand as well as the variety of fire data, the study shows how the efficiency and accuracy of the fire detection model.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering based Indexing of Celebrity Cartoon Images for Retrieval 基于聚类的名人卡通图像检索索引
Shivaprasad D L, D. S. Guru, K. R, Saritha N
{"title":"Clustering based Indexing of Celebrity Cartoon Images for Retrieval","authors":"Shivaprasad D L, D. S. Guru, K. R, Saritha N","doi":"10.1109/CCIP57447.2022.10058621","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058621","url":null,"abstract":"Celebrity cartoon image has its own attention as it characterizes a famous personality and also serves as a good platform to communicate the scenario, express emotions and makes it easy to perceive without much effort. Retrieval of celebrity cartoon images based on a query cartoon image is a difficult task because of the presence of caricatures, sketches, drawings, painting and artistic style variations. Matching cartoon images and retrieving them is a challenging task as artists may vary the same image with different styles and shape exaggerations for the same feature. A novel clustering based tree is constructed with different levels and each level with varied number of nodes. The nodes are expected to have similar images which are identified using partitional clustering. Tree based indexing is created by designating unique indices for each node. The indices are framed in such a way that they follow their parent node. The given query image traverses the tree till leaf node to retrieve the images based on a distance threshold. If the required number of images are not retrieved, then backtracking is done to retrieve the similar images in the other children nodes of same parent which are reached from the root based on the distance. The IIIT-Cartoon Faces in the Wild (IIIT-CFW) dataset is taken for the experimentation. Images considered in this dataset contains caricatures, paintings, cartoons and sketches of celebrities. Through analysis, it is found that the proposed approach performs well in terms of evaluation measures as precision and recall, time and number of relevant retrieved images. Also it can be used in reduction of search space in recognition of images as the retrieved relevant images could be used as a competent search space. Hence, the proposed approach aids subsequently the celebrity cartoon image recognition. The proposed approach is compared against two models as retrieval using linear search and linear search based on class representative.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Quality Enhancement by format-specific Digital Object Tracking 通过特定格式的数字对象跟踪提高图像质量
G. Maheswari, K. Remya, R. Reenadevi, J. Surendiran, S. Prasad, K. Sathish
{"title":"Image Quality Enhancement by format-specific Digital Object Tracking","authors":"G. Maheswari, K. Remya, R. Reenadevi, J. Surendiran, S. Prasad, K. Sathish","doi":"10.1109/CCIP57447.2022.10058691","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058691","url":null,"abstract":"In general, selecting an image format is crucial for deciding what kind of results to display in picture searches. Among the most significant discoveries about RAW and JPEG formats, this is. Even yet, most experts in the field are able to tell the difference between the two. Images in JPEG format are widely used because of their quality and convenience. Images are often saved in JPG format before being printed or uploaded online. There are now worries regarding JPEGs' visual quality. This is the most used picture compression format, thus it's required by the great majority of digital cameras. However, this alters the photos irreversibly, rendering them unrecognisable. Selecting an appropriate picture format is the primary challenge here. This research proposed a smart format improved object tracking approach to boost digital image quality. By default, the camera is set to reduce the size of the captured image files by discarding unnecessary pixels. Depending on your preferences, the compression might be higher or lower. Cameras will reject the bare minimum of data if the file size is set too high. As the number of potential viewers increases, the resolution drops. The suggested method is effective in improving the compression ratio of items.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sign Language Recognition Using Deep Learning 使用深度学习的手语识别
N. M
{"title":"Sign Language Recognition Using Deep Learning","authors":"N. M","doi":"10.1109/CCIP57447.2022.10058655","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058655","url":null,"abstract":"The ability to converse with hearing and deaf persons has always been difficult for those who are tongue-tied. In this paper, we can see different methods which are introduced to help them to communicate effectively. There are many human interpreters or assistant tools to help them communicate, but each person cannot afford that aid. The only mode of communication for them is sign language. Therefore, the project's primary goal is to assist those individuals by providing a system that will recognize the signs, translate them into text, and enable them to lead a normal social life. Previously, a method including hand detection had been developed as a learning tool for novices in sign language. The system was developed using a method based on skin color modeling known as explicit skin-color space thresholding. The specified range of skin tones will distinguish between pixels, or the hand, and non-pixels, or the background. The photos were given as input to a model called the CNN a deep learning algorithm. We will be implementing this project using Keras to train the images. This document provides information on a variety of projects/research on sign language detection in the domains of machine learning, deep learning, and image depth data. This study considers a number of the numerous problems that must be overcome in order to overcome this problem, as well as the future scope.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信