2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)最新文献

筛选
英文 中文
A multinomial technique for detecting fake news using the Naive Bayes Classifier 一种使用朴素贝叶斯分类器检测假新闻的多项技术
Ashwini S. Yerlekar, N. Mungale, Sampada S. Wazalwar
{"title":"A multinomial technique for detecting fake news using the Naive Bayes Classifier","authors":"Ashwini S. Yerlekar, N. Mungale, Sampada S. Wazalwar","doi":"10.1109/iccica52458.2021.9697244","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697244","url":null,"abstract":"Faux news and hoaxes are there for the reason that before the advent of the internet. The broadly common definition of internet fake news is: \"fictitious articles intentionally fancied to lie to readers\". Social media and information stores submit fake information to increase the target market or as part of battle. This exposition analyses the prevalence of pretend news in light-weight of the advances in verbal exchange created capacity by the emergence of social networking web sites. We tend to apply device mastering techniques to classify the datasets. The Fake news detection may be utilized by users to sight a piece of writing containing fake and dishonorable info. This paper indicates an easy technique for faux news detection using naive Bayes classifier. We have a tendency to use honest and punctiliously decided on alternatives of the name and publish to appropriately determine fake posts. On the test set, we achieved a type accuracy of 80% approximately, which is a decent result given the version's relative simplicity.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight Blockchain Secured Framework for Smart Precise Farming System 智能精准农业系统的轻量级区块链安全框架
Jayant P. Mehare, M. Bartere
{"title":"Lightweight Blockchain Secured Framework for Smart Precise Farming System","authors":"Jayant P. Mehare, M. Bartere","doi":"10.1109/iccica52458.2021.9697241","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697241","url":null,"abstract":"Smart farming is a technology framework that links the many components of agriculture to generate new possibilities. This link is made possible by the Internet of Things (IoT), which gives physical items a digital identity. Some research have suggested combining Blockchain technology with Internet of Thing in various case studies such as orchestration, access, and replicated storage layer. Owing to its redundancies and conventional consensus that requires a lot of processing. Blockchain is insufficient for the majority of linked items due to capacity limitations. This article tackles these issues by providing a new lightweight Blockchain architecture with a lightweight consensus and structure. According to their processing and storage capabilities, the proposed architecture of framework displays a linked object role hierarchy. We presented a security framework that blends the blockchain technology with IoT devices to provide a secure communication platform in Smart Precise Farming System and to take use of the capabilities of high-capacity objects like Edge and Fog computing nodes.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of Various Algorithms for Facial Expression Recognition: A Review 各种面部表情识别算法的研究综述
Devasena G, V. V
{"title":"A Study of Various Algorithms for Facial Expression Recognition: A Review","authors":"Devasena G, V. V","doi":"10.1109/iccica52458.2021.9697318","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697318","url":null,"abstract":"Facial Expression Recognition (FER) is an important thrust area in the field of artificial intelligence and computer vision. The features of various faces and their characteristics are analyzed to achieve the concept of FER. The facial characteristics are retrieved using an automated face detection method which helps to identify the emotions of a person. This study examines in-depth FER investigations using several techniques, such as template, appearance, knowledge-based and feature-based approaches, coupled with a variety of algorithms such as viola jones, Faster RCNN, SSD, MTCNN and Face landmark Detection. These techniques are used to classify the different emotions of the human face such as happiness, wrath, sorrow, disgust, fear, neutrality, surprise and disdain. Moreover, research works based on deep learning based FER models are also examined.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GCL And ILM Layer Extraction From OCT Images For Glaucoma Detection 从OCT图像中提取GCL和ILM层用于青光眼检测
Gangadevi C. Bedke, M. Jadhav, Pramodini A. Punde, Monali D. Rathod, Swapnil Dongaonkar
{"title":"GCL And ILM Layer Extraction From OCT Images For Glaucoma Detection","authors":"Gangadevi C. Bedke, M. Jadhav, Pramodini A. Punde, Monali D. Rathod, Swapnil Dongaonkar","doi":"10.1109/iccica52458.2021.9697135","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697135","url":null,"abstract":"Glaucoma is the second leading cause of blindness in worldwide, it can cause due to increase in intra ocular pressure and loss of retinal nerve fiber layers, it can cause total vision loss if it is not treated earlier, so there is need of early detection of glaucoma. For the early detection of glaucoma, we have used Optical Coherence tomography images; we collected 87 normal and 112 glaucomatous images. In this our research study, we analyzed OCT images and we extracted GCL and ILM layers using image processing techniques, after extraction of GCL and ILM layers, we measured thickness of nerve fiber layers.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"88 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120841089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Blockchain-Based System: Transaction Throughput Latency and Challenges 基于区块链的系统综述:交易吞吐量延迟和挑战
M. Gracy, B. Rebecca Jeyavadhanam
{"title":"A Systematic Review of Blockchain-Based System: Transaction Throughput Latency and Challenges","authors":"M. Gracy, B. Rebecca Jeyavadhanam","doi":"10.1109/iccica52458.2021.9697142","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697142","url":null,"abstract":"Blockchain is a relatively new technology that is already gaining traction in the academic community. A peer-topeer network structure underpins blockchain technology. It is made up of blocks, which are inventories that develop as new accounts are added to the system. Blockchain's stability is ensured by cryptographic technology. Although blockchain is rapidly developing and providing us with a secure and convenient service, it is not without its drawbacks. Bitcoin suffers from low throughput and high latency, both of which are detrimental to the scalability of the blockchain. The transaction rate of Bitcoin is 4.6 transactions per second. Visa conducts 1,700 transactions every second on average. Since the number of transactions on the blockchain is increasing every day, it's critical to address scalability problems until the system hits its limit. Privacy leakage and selfish mining are explored in detail, along with potential solutions. As a future direction, we envisage focusing more on improving the efficiency of throughput and latency with the suggested solutions of authentication, monitoring selection for an epoch, and mass mining using modified proof of work algorithm.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recurrent Neural Networks Based Approach for Intrusion Detection System 基于递归神经网络的入侵检测系统
Arjita Shrivastava, Yogadhar Pandey
{"title":"Recurrent Neural Networks Based Approach for Intrusion Detection System","authors":"Arjita Shrivastava, Yogadhar Pandey","doi":"10.1109/iccica52458.2021.9697281","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697281","url":null,"abstract":"The aimaof this analysis is the creation and associate build up the system to forestall an organism against each well-known a and a new attacks, and functions as an adaptive distribute defense system or adaptive artificial system. Artificial Immune Systems abstract the structure of immune systems to include memory, fault detection and adaptive learning. Wea tend to propose associate system primarily based real time intrusion detection system exploitation supervised learning algorithmic rule. This paper used KDD-99 as a test data set and perform our proposed methodology NABa (Numentaa Anomaly Benchmark) algorithm. This algorithm basically consists of two operation, training phase and testinga or detectionaphase respectively. Our proposed methodology can be perform on all kinds of attributes class (Large data set and Reduced data set) and show some improve results in term accuracy and better detection rate of unauthorized activities.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Possibilities and Apprehensions in the Landscape of Artificial Intelligence in Education 人工智能在教育领域的可能性和忧虑
Ashraf Alam
{"title":"Possibilities and Apprehensions in the Landscape of Artificial Intelligence in Education","authors":"Ashraf Alam","doi":"10.1109/iccica52458.2021.9697272","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697272","url":null,"abstract":"Artificial intelligence (AI) may be utilized outside of traditional computer settings and is also readily available in low-cost smart devices, making AI easily accessible to general population. Built-in capabilities for conducting complicated computer operations (edge computing), cloud-based services for collaboratively addressing difficult issues, access to huge quantities of open and closed data resources, and conciliatory accession for agile network connections are all available on these low-cost devices. Education is helped by AI in at least two ways: (1) the educational process – assistance and modifications to pedagogy and educator's routine function; and (2) the educational ambit and content – what kind of education is needed. Author, in this article, explores the challenges and potentialities that AI offers in the field of education. While the focus is on AI's participation, it may be difficult to differentiate it from other technological advancements, especially when it comes to work life. Author conclude that AI (and associated technological advancements) will substitute some professions (didactics will not be required), that other professions will transform impressively (didactic materials will need to be updated), and that a significant number of novel vocations will be created (new-fangled didactics must be constituted). In educational operations – the task itself – AI will be a reformer as well as a facilitator, altering the characteristics and division of labor.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134266429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Question Answering System for low resource language using Transfer Learning 基于迁移学习的低资源语言问答系统
Aarushi Phade, Y. Haribhakta
{"title":"Question Answering System for low resource language using Transfer Learning","authors":"Aarushi Phade, Y. Haribhakta","doi":"10.1109/iccica52458.2021.9697268","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697268","url":null,"abstract":"This paper proposes a Question Answering System for Marathi language using Transfer Learning. A well performing Question Answering system leverages the word embeddings used in the system. Producing word embeddings for a language from the scratch is a drawn-out task and requires tremendous dataset and huge computing resources. Utilizing word embeddings created from a limited dataset in NLP tasks prompts average per-formance. Instead utilizing word embeddings from pre-trained models saves a lot of time, and gives great performance, since these models have more learnable parameters and are trained on huge datasets. Our framework uses Multilingual BERT model as pre-trained source model having 110M parameters which leads to effective word representation. We have fine-tuned this BERT model for QAS with the assistance of a small, custom dataset similar to SQuAD, intended for this framework. The system uses Bert-score and F1-score as its evaluation methods. It achieves F1-score of 56.7% and Bert-score of 69.08%. The system being the first of its kind in Marathi language lays the groundwork for future research.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification and Revocation of Faulty Nodes from Deployment Area 部署区域故障节点的识别与撤销
D. Prasad, A. Bindal, Afshan Hassan, K. Gupta, A. Garg
{"title":"Identification and Revocation of Faulty Nodes from Deployment Area","authors":"D. Prasad, A. Bindal, Afshan Hassan, K. Gupta, A. Garg","doi":"10.1109/iccica52458.2021.9697242","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697242","url":null,"abstract":"Wireless Sensor Networks (WSNs) is one of the arduous disciplines of research. The nodes of the network are often distributed at random from a flying base station (BS) in the deployment region, resulting in an unequal distribution of SNs and they may also be harmed as a result of natural disasters. To achieve a uniform dispersion, these stationary SNs require exogenous kinetics to establish suitable location in the deployment zone. The paper envisions the incorporation of framework to implement fault revocation and a uniform distribution of SNs in the deployment region. This helps the sink nodes utilize the similar amount of energy. These static SNs acquire exogenous kinetics from energy rich MSNs for their uniform distribution. However, if a node is destroyed as a result of environmental activities, the architecture allows for fault revocation in the deployment region using a Fault Revoking Mobile Sensor Node (FRMN).","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131072041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Melody generation using LSTM and BI-LSTM Network 使用LSTM和BI-LSTM网络生成旋律
Satish Chikkamath, N. S. R
{"title":"Melody generation using LSTM and BI-LSTM Network","authors":"Satish Chikkamath, N. S. R","doi":"10.1109/iccica52458.2021.9697286","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697286","url":null,"abstract":"The use of machine learning and deep learning to solve problems in literary arts has been a recent trend and gained much importance. Traditional issues like sound classification, Music source classification, and Music Autotagging have received enough attention from researchers. However, deep learning is receiving much importance in generating music. In this work, we have used Long Short Term Memory (LSTM) and Bidirectional Long Short Term Memory (BI-LSTM), which are classes of Recurrent Neural Network (RNN) to generate melodies. The direct use of these deep architectures may mimic the network's data samples without making meaning out of them. To justify the uniqueness of the generated music piece, We have used Dynamic Time Warping (DTW) technique, which measures the similarity between two temporal sequences, namely training music sample and generated music sample.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121523877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信