2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)最新文献

筛选
英文 中文
Detecting Masked Faces using Region-based Convolutional Neural Network 基于区域卷积神经网络的蒙面检测
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342737
Jenil Gathani, Krish Shah
{"title":"Detecting Masked Faces using Region-based Convolutional Neural Network","authors":"Jenil Gathani, Krish Shah","doi":"10.1109/ICIIS51140.2020.9342737","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342737","url":null,"abstract":"Precisely detecting masked and non-masked faces are increasingly important since wearing a face mask is an effective measure to prevent the spread of the COVID-19 pandemic. Previous literature focused mainly on occluded face detection or facial expression, which were unsuitable for the application of detecting human faces wearing masks. Hence, to overcome the issue, this work proposes a Convolutional Neural Network-based model that uses region proposals to detect masked and nonmasked faces. The depth of the Convolutional Neural Network was increased by using residual skip-connections. The model was implemented using TensorFlow Object Detection API and was pre-trained over the COCO dataset. A secondary outcome of the paper was to collect a dataset of high resolution masked and nonmasked faces for training deep learning frameworks, due to the lack of datasets available for this task. The proposed model was compared with the SSD Inception V2 model [1] and the SSD MobileNet V2 model [2] in the context of detection accuracy (mAP). The experiments highlight that the proposed framework achieves a detection accuracy (total mAP) of 85.82%, on the collected dataset. The results are significantly better in detecting non-masked faces with a detection accuracy (mAP) of 98.61% while it is 68.72% accurate in detecting masked faces. Based on this model’s performance on standard parameters, a detailed study is outlined along with the conclusion and future plan of action.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128593424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification and Mitigation Tool for Sql Injection Attacks (SQLIA) Sql注入攻击(SQLIA)识别和缓解工具
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342703
W. Rankothge, Mohan Randeniya, Viraj Samaranayaka
{"title":"Identification and Mitigation Tool for Sql Injection Attacks (SQLIA)","authors":"W. Rankothge, Mohan Randeniya, Viraj Samaranayaka","doi":"10.1109/ICIIS51140.2020.9342703","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342703","url":null,"abstract":"Structured Query Language Injection Attack (SQLIA) is a very frequent web security vulnerability. The attacker adds a malicious Structured Query Language (SQL) code to the input field of a web form, so that he can gain access to data or make unauthorized changes to data. A successful malicious SQL injection cause serious consequence to the victimized organization such as financial loss, reputation loss, compliance, and regulatory breaches. There have been several research works on detection and prevention of SQL injection attacks. However, still there is an absence of an advanced single tools for both identification and mitigation of SQL injection attacks.We have proposed an approach to identify and mitigate SQL injection attacks using a single tool and it allows software testers to identify the SQL injection vulnerabilities of their web applications during the testing stages. The proposed approach is based on parameterized queries and user input validation. Our results show that the tool provides 100% accurate and efficient results on identification and mitigation of SQL vulnerabilities","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Measuring PD under Fast Slew Rate, High Voltage and High Frequency Repetitive Voltage Impulses 快速摆速、高压和高频重复电压脉冲下PD的测量
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342633
R. Ghosh, P. Seri, G. Montanari
{"title":"Measuring PD under Fast Slew Rate, High Voltage and High Frequency Repetitive Voltage Impulses","authors":"R. Ghosh, P. Seri, G. Montanari","doi":"10.1109/ICIIS51140.2020.9342633","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342633","url":null,"abstract":"Increasing specific power in emerging assets, as those for electrification transport, is a must that is substantiated through the use of power electronic drives, having increasingly higher voltage, switch slew rate and frequency. This paper proposes time-domain based algorithms able to separate and identify PD pulses occurring during voltage impulse rise time, thus very hardly detectable. The paper investigates the validity of such algorithms as a function of voltage amplitude and modulation frequency. The proposed method is effective in extreme conditions where PD pulses and switching noise overlap integrally in the frequency domain, and they are not easily recognizable in the time domain even by an expert eye.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"649 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115830838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transfer Learning by Deep Tuning of Pre-trained Networks for Pulmonary Nodule Detection 基于深度调优预训练网络的迁移学习肺结节检测
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342686
Dhaarna Sethi, K. Arora, Seba Susan
{"title":"Transfer Learning by Deep Tuning of Pre-trained Networks for Pulmonary Nodule Detection","authors":"Dhaarna Sethi, K. Arora, Seba Susan","doi":"10.1109/ICIIS51140.2020.9342686","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342686","url":null,"abstract":"Lung Cancer is one of the most common forms of cancer found worldwide and the accurate detection of lung nodules from computed tomography (CT) scans is a crucial preliminary step in the diagnosis procedure. In this paper, we address the problem of pulmonary nodule detection with an aim to design a robust model using deep convolutional neural networks (CNN) with transfer learning and fine-tuning of network weights. We use the benchmark LIDC/IDRI dataset which is derived from a set of CT scans that are cropped using annotations provided by a radiologist. Our study focuses on observing the effects of knowledge transfer from a non-medical domain to a medical domain using the pre-trained network architectures of VGG-19, ResNet-50, MobileNet and Inception-V3. We also analyze the effects of fine-tuning on the performance of the network. Shallow tuning refers to fine-tuning only the last few layers of the deep network while deep tuning refers to fine-tuning all the layers of the deep convolutional network. We compare the performance of the state-of-the-art convolutional architectures pre-trained on the ImageNet database, for both shallow and deep tuning.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116919061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Critical Analysis of IS 1255-1983, Reaffirmed 1996 for “Code of Practice for Installation and Maintenance of Power Cables up to and Including 33 kV Rating” 对IS 1255-1983的批判性分析,1996年重申的“额定电压33千伏及以下电力电缆的安装及维修工作守则”
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342732
Ravitesh Kumar, P. Nair
{"title":"Critical Analysis of IS 1255-1983, Reaffirmed 1996 for “Code of Practice for Installation and Maintenance of Power Cables up to and Including 33 kV Rating”","authors":"Ravitesh Kumar, P. Nair","doi":"10.1109/ICIIS51140.2020.9342732","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342732","url":null,"abstract":"Traditionally power cables, during installation or maintenance, are tested with a dc high voltage for its electrical strength as prescribed in IS 1255-1983, reaffirmed 1996. Modern extruded dielectric power cables such as Cross Linked Poly Ethylene (XLPE) have inherent space charge accumulation tendencies when subjected to a high voltage dc. The accumulated space charge leads to over stressing of insulation resulting in cable breakdown with a high downtime and repair costs. As IS 1255-1983 is silent on the harmful effect of dc on XLPE cables, power companies in India are facing revenue losses as well as the quality of service to the consumer is affected.This paper analyses the demerits of IS 1255 and compares it with the other available test methods such as Very Low Frequency (VLF) and Damped Alternating Current (DAC) test, as well as condition assessment methods, such as Dissipation Factor and Partial Discharge. A case study highlighting the advantages of newer test methods has been presented and a cost to benefit analysis is undertaken.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127230651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universal Text Scanner Solution 通用文本扫描解决方案
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342646
Narayana Darapaneni, Arjun Makar, Sumathi Gunasekaran, Trapti Kalra, Bhanu Jain, Anwesh Reddy Padur, Divakar Joshi, M. Jain
{"title":"Universal Text Scanner Solution","authors":"Narayana Darapaneni, Arjun Makar, Sumathi Gunasekaran, Trapti Kalra, Bhanu Jain, Anwesh Reddy Padur, Divakar Joshi, M. Jain","doi":"10.1109/ICIIS51140.2020.9342646","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342646","url":null,"abstract":"Receipt data extraction and digitization is difficult even today attributing to the fact that receipts have a lot of variations mainly in the form of being crumpled, soiled and the overall scanning quality of the images being low. The major problems the industries are facing today in the domain are:(i)The lack of generalization in standard OCR solutions and other custom pipelines built from open source api like tesseract etc.(ii)High cost, yet low accuracy of commercially available solutions.(iii)Requirement for organization to supply large volumes of hand annotated images for training. In the paper we explain a strategy to overcome these limitations and to build a holistic pipeline for text detection and extraction deployable in real word. We have surveyed traditional methods as well as known recent CNN based architectures and moved on to explain the application of the novel architecture Connectionist Text Proposal Network(CTPN),to solve for the specific task of text detection in scanned text heavy images. We also compared the CTPN outcomes against outcomes on the state-of-art-trained SSD on sample dataset and it justified how the CTPN is a more suitable algorithm for this use case.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sigma Delta Radio Frequency Transport System for 5G Sub-6 GHz Fronthauls 用于5G Sub-6 GHz前哨的Sigma Delta射频传输系统
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342673
M. Hadi
{"title":"Sigma Delta Radio Frequency Transport System for 5G Sub-6 GHz Fronthauls","authors":"M. Hadi","doi":"10.1109/ICIIS51140.2020.9342673","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342673","url":null,"abstract":"The article proposes and demonstrates the real time Sigma Delta Radio over Fibre ($SigmaDelta$-RoF) system implementation focusing 5G cloud/centralized radio access network (C- RAN) fronthaul implementations. The $SigmaDelta$-RoF has been demonstrated by using 2nd order Sigma-Delta Modulation (SDM). The benchmark has been validated for 20-MHz LTE signal with 256 quadrature amplitude modulation having a carrier frequency of 3.5 GHz with 5 km of Standard Single Mode Fibre. Moreover, it is shown that by keeping the complexity low as Analog Radio Rover Fibre System (A-RoF), $SigmaDelta$-RoF outperforms the A-RoF. The performance is presented by reporting adjacent channel leakage ratio and error vector magnitude. It can be inferred that $SigmaDelta$-RoF corroborates the required range of the 5GC-RAN fronthaul networks and can be a propitious candidate for future mobile haul applications.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124122266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of Malicious Code Variants using Spp-Net Model and Color Images 基于Spp-Net模型和彩色图像的恶意代码变体识别
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342648
Anita Brigit Mathew, S. Kurian
{"title":"Identification of Malicious Code Variants using Spp-Net Model and Color Images","authors":"Anita Brigit Mathew, S. Kurian","doi":"10.1109/ICIIS51140.2020.9342648","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342648","url":null,"abstract":"With the rapid growth of the internet, security breaches have also increased employing malicious code attacks. Current methods for the detection of these codes require much improvement over the use of the same size dataset images and poor features of greyscale images. This paper proposed a method using the SPP-net model which can accept images of various sizes as input and also color images which provide many features for the detection of variants. Since the addition of a sublayer is required frequently, deep learning concept is incorporated. Also, they improve the detection of malicious variants too. Experimentation is done using CNN for the classification and SPP- net for various size images. Thus, the CNN architecture used in our proposed work is VGG16 which can deal with large scale recognition.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
e-Agriculture: Irrigation System based on Weather Forecasting 电子农业:基于天气预报的灌溉系统
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342739
K. Guravaiah, S. Raju
{"title":"e-Agriculture: Irrigation System based on Weather Forecasting","authors":"K. Guravaiah, S. Raju","doi":"10.1109/ICIIS51140.2020.9342739","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342739","url":null,"abstract":"Internet of Things (IoT) is an emerging area to assist agriculture related applications. Applications such as smart gardening, water maintenance, other equipment automatic installations based on human actions, etc., can be implemented using IoT. In this paper, a wireless sensor based networking system is proposed to address water pumping system to crop and feed nutrients to crop. The first problem is to automate the process of pumping the water to crop in a garden. Temperature and humidity sensor are used to monitor the temperature in order to initiate the water pumping system, while soil moisture sensors are used for sensing the water level and initiate the process of pumping the water to the crops in the garden. Rain sensor is used to check the rain, if rain is coming it is going to stop all the motors. Second, liquid nutrients will be given to crop with water pumping system using venturi injector. River Formation Dynamics based data collection is applied to collect and store the information in server for further processing. Proposed systems are deployed and demonstrated using open-source hardware such as micro controller, GSM, etc.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122482055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Inception C-Net(IC-Net): Altered Inception Module for Detection of Covid-19 and Pneumonia using Chest X-rays Inception C-Net(IC-Net):修改后的Inception模块,用于使用胸部x射线检测Covid-19和肺炎
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) Pub Date : 2020-11-26 DOI: 10.1109/ICIIS51140.2020.9342741
Narayana Darapaneni, Tushar Gupta, A. Paduri, Arpit Banerji, Sanjay Sharma, D. Sharma, N. Gupta
{"title":"Inception C-Net(IC-Net): Altered Inception Module for Detection of Covid-19 and Pneumonia using Chest X-rays","authors":"Narayana Darapaneni, Tushar Gupta, A. Paduri, Arpit Banerji, Sanjay Sharma, D. Sharma, N. Gupta","doi":"10.1109/ICIIS51140.2020.9342741","DOIUrl":"https://doi.org/10.1109/ICIIS51140.2020.9342741","url":null,"abstract":"Data Science, being the most imperative part of Medical Science, is contributing its vital role in finding solutions to the greatest existing hurdles. It is being used to develop drugs, diagnose diseases, automate ventilators, and what not in a very short span of time which can otherwise become a very lengthy process. In early 2020 we have seen the arrival of another deleterious disease named as Covid-19. Artificial Intelligence is playing a major role in controlling the outbreak of this disease which has been declared a pandemic by WHO. Elaborating the power of computer vision, in this project we are trying to detect the Covid-19 pandemic with the help of Chest X-rays of the patients suffering from this disease.","PeriodicalId":352858,"journal":{"name":"2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122603019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信