Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)最新文献

筛选
英文 中文
An Efficient FPGA Architecture to Automatically Detect the Condition of Orange Fruit 一种高效的可编程门阵列结构自动检测橙子果实状态
N. Renuka, Shivaputra, Rudresh, L. R. Meenakshi
{"title":"An Efficient FPGA Architecture to Automatically Detect the Condition of Orange Fruit","authors":"N. Renuka, Shivaputra, Rudresh, L. R. Meenakshi","doi":"10.2991/ahis.k.210913.050","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.050","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Hierarchical Sparse Kernel Classification Model for Remote Sensing Image Retrieval 一种用于遥感图像检索的混合层次稀疏核分类模型
S. Sudha, S. Aji
{"title":"A Hybrid Hierarchical Sparse Kernel Classification Model for Remote Sensing Image Retrieval","authors":"S. Sudha, S. Aji","doi":"10.2991/ahis.k.210913.011","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.011","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Convergence of Deep Learning and Computer Vision: Smart City Applications and Research Challenges 深度学习与计算机视觉的融合:智慧城市应用与研究挑战
Deep R. Kothadiya, Aayushi Chaudhari, Ruchita Macwan, Krishna Patel, C. Bhatt
{"title":"The Convergence of Deep Learning and Computer Vision: Smart City Applications and Research Challenges","authors":"Deep R. Kothadiya, Aayushi Chaudhari, Ruchita Macwan, Krishna Patel, C. Bhatt","doi":"10.2991/ahis.k.210913.003","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.003","url":null,"abstract":"In recent years, deep learning strategies started to outshine traditional machine learning methods in a few fields, with Computer Vision being one of the most noticeable ones. The Computer Vision is becoming more suitable nowadays at identifying patterns from images than the human visual cognitive system. It ranges from raw information recording to methods and ideas that span digital image processing, machine learning, and computer graphics. The wide utilization of Computer Vision has attracted many researchers to incorporate their ideas with different fields and disciplines. The era of smart cities has emerged to meet the recent demands of citizens using information and communication technology. This paper reviews research efforts that utilize Deep Learning Frameworks and Computer Vision Applications in support of smart city applications like smart healthcare, smart transportation, smart agriculture, etc. Furthermore, the paper identified key research challenges that emanate from the use of deep learning and computer vision in support of smart city services.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
More Accurate Organ Recipient Identification Using Survey Informatics of New Age Technologies 利用新时代调查信息技术更准确地识别器官受者
Benita Jose Chalissery, V. Asha, B. M. Sundaram
{"title":"More Accurate Organ Recipient Identification Using Survey Informatics of New Age Technologies","authors":"Benita Jose Chalissery, V. Asha, B. M. Sundaram","doi":"10.2991/ahis.k.210913.002","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.002","url":null,"abstract":"Organ transplantation is a miraculous achievement for most of the end-stage diseases caused due to organ failure. Providing the organ to the most accurate recipient is always a challenge. The survival prediction of the recipient based on various health and environmental/infrastructural data (e.g.: live traffic) is not considered in the current selection algorithms, thus reducing the healthy lifespan of the recipient. The objective of this research is to do an in-depth analysis of the historical transplantation data for the organ (kidney) and figure out statistical evidence of various parameters which are affecting the survival time of the organ recipient. Both univariant and covariant analysis (impact in conjunction with other varying parameters) of these data parameters are studied. The result of this study was further analyzed to identify such parameters which vary frequently with time but also impact the predicted survival curve of the recipient. The research focuses on the benefit of new-age technology such as IoT in accurately predicting the most suitable recipient with a longer survival curve. The research ultimately wants to bring out an efficient recipient identification mechanism for organ procurement and transplantation","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Challenges and Latest Trends on Cyber Security Using Text Cryptography 基于文本加密技术的网络安全挑战与最新趋势综述
Anjali, R. B. Kshiteesh, UH Rohan Koundinya, R. Varun, A. Ajina, G. Prathima
{"title":"A Review on Challenges and Latest Trends on Cyber Security Using Text Cryptography","authors":"Anjali, R. B. Kshiteesh, UH Rohan Koundinya, R. Varun, A. Ajina, G. Prathima","doi":"10.2991/ahis.k.210913.024","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.024","url":null,"abstract":"In the IT sector, an important role is played by Cyber Security. Securing information has become one of the biggest challenges even today. The cybercrimes are growing enormously bit by bit and many measures are taken to prevent cyber-crimes. Despite these dealings, cybersecurity is still a tremendous apprehension to many. So, this paper emphasizes encounters met by cybersecurity and the modern cyber security performances using text cryptography. The secured way of transmission of data over the network from security attacks is using cryptography. This paper explores different cryptographic approaches to improve data security and performance evaluation metrics. The notable ones among them like Playfair, BCD encoded key management and Blowfish operate on discrete techniques of their own. Unlike the conventional encryption schemes which focus on improving algorithms for the text message, the BCD method aims at enriching the algorithm for key generation. The Blowfish functions on subkey generation and permutation for data encryption.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Invigilation Using Computer Vision 使用计算机视觉的自动监考
M. Malhotra, I. Chhabra
{"title":"Automatic Invigilation Using Computer Vision","authors":"M. Malhotra, I. Chhabra","doi":"10.2991/ahis.k.210913.017","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.017","url":null,"abstract":"Educational institutions determine students’ strengths and weaknesses through exams. Students find numerous ways to cheat in physical exams like exchanging their sheets, using hidden notes, getting good grades, fulfilling their parents’ expectations, and whatnot. Due to the physical limitations of human supervisors, typical invigilation methods cannot conduct successful exams while maintaining their integrity. An automated method based on computer vision to detect anomalous activities during exams is proposed in this study. This study centers around invigilating students’ suspicious behaviour during physical exams through closed-circuit television (CCTV) cameras. The proposed method uses You Only Look Once (YOLOv3) with residual networks as the backbone architecture to inspect cheating in exams. The obtained results show the credibility and efficiency of the proposed method. The experimental results are promising and demonstrate the invigilation of the students in the examination. In this work, achieve 88.03% accuracy for the detection of cheating in the classroom environment","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Combined Model with Reduced Label Dependency for Malware Classification 一种降低标签依赖的恶意软件分类新组合模型
Prishita Ray, Tanmayi Nandan, Lahari Anne, K. A. Kumar
{"title":"A New Combined Model with Reduced Label Dependency for Malware Classification","authors":"Prishita Ray, Tanmayi Nandan, Lahari Anne, K. A. Kumar","doi":"10.2991/ahis.k.210913.004","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.004","url":null,"abstract":"With the technological advancements in recent times, security threats caused by malware are increasing with no bounds. The first step performed by security analysts for the detection and mitigation of malware is its classification. This paper aims to classify network intrusion malware using new-age machine learning techniques with reduced label dependency and identifies the most effective combination of feature selection and classification technique for this purpose. The proposed model, L2 Regularized Autoencoder Enabled Ladder Networks Classifier (RAELN-Classifier), is developed based on a combinatory analysis of various feature selection techniques like FSFC, variants of autoencoders and semisupervised classification techniques such as ladder networks. The model is trained and tested over UNSW-NB15 and benchmark NSL-KDD datasets for accurate real time model performance evaluation using overall accuracy as well as per-class accuracy and was found to result in higher accuracy compared to similar baseline and state-of-the-art models.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126286072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Cross of Intra and Inter Modalities for Visual Question Answering 视觉问答的内部和内部模式的深度交叉
Rishav Bhardwaj
{"title":"Deep Cross of Intra and Inter Modalities for Visual Question Answering","authors":"Rishav Bhardwaj","doi":"10.2991/ahis.k.210913.007","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.007","url":null,"abstract":"Visual Question Answering (VQA) has recently attained interest in the deep learning community. The main challenge that exists in VQA is to understand the sense of each modality and how to fuse these features. In this paper, DXMN (Deep Cross Modality Network) is introduced which takes into consideration not only the inter-modality fusion but also the intra-modality fusion. The main idea behind this architecture is to take the positioning of each feature into account and then recognize the relationship between multi-modal features as well as establishing a relationship among themselves in order to learn them in a better way. The architecture is pretrained on question answering datasets like, VQA v2.0, GQA, and Visual Genome which is later fine-tuned to achieve state-of-the-art performance. DXMN achieves an accuracy of 68.65 in test-standard and 68.43 in test-dev of VQA v2.0 dataset.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech to Indian Sign Language Translator 对印度手语翻译的演讲
Alisha Kulkarni, Archith Vinod Kariyal, V. Dhanush, Paras Nath Singh
{"title":"Speech to Indian Sign Language Translator","authors":"Alisha Kulkarni, Archith Vinod Kariyal, V. Dhanush, Paras Nath Singh","doi":"10.2991/ahis.k.210913.035","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.035","url":null,"abstract":"A Sign Language is a non-verbal communication system in which people communicates by visually transferring sign patterns to express their meaning. A large section of the hearing and speech impaired in India uses Indian Sign Language (ISL) as their mode of communication. Recognition of sign language was significant not only from a technical standpoint but also in terms of societal influence. An automatic speech-to-ISL translation system could help the hearingimpaired access more information and services due to the inherent limitations of communicating through written texts. Furthermore, the system can be utilised as an educational tool to learn ISL in addition to improving information access. This paper intends to bridge the gap by providing a system that anybody can use without having to learn ISL.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Quality Characteristics of an LMS UX Psychomotor Model for the Design and Evaluation of Learning Management Systems 学习管理系统设计与评价的LMS UX心理运动模型的质量特征
Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel
{"title":"Quality Characteristics of an LMS UX Psychomotor Model for the Design and Evaluation of Learning Management Systems","authors":"Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel","doi":"10.2991/ahis.k.210913.030","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.030","url":null,"abstract":"In this study an investigation was conducted to ascertain the possibility of conceptualizing and developing a native user experience psychomotor model for the design and evaluation of the experiences of learning management systems (LMSs) users. The paper found that no previous model of this kind is in existence. Sequel to this discovery, a conceptualization of the model was done using the psychomotor component of the Bloom’s learning taxonomy. The study then captured suitable dimensions/quality elements that best define/influence the model. These dimensions and quality elements include interactivity, engageability, ludicity, and sociability. The study hence proposes the adoption of this novel UX psychomotor model for the design and evaluation of the user experiences of LMS platforms learners.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131664467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信