{"title":"An Efficient FPGA Architecture to Automatically Detect the Condition of Orange Fruit","authors":"N. Renuka, Shivaputra, Rudresh, L. R. Meenakshi","doi":"10.2991/ahis.k.210913.050","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.050","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Hierarchical Sparse Kernel Classification Model for Remote Sensing Image Retrieval","authors":"S. Sudha, S. Aji","doi":"10.2991/ahis.k.210913.011","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.011","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deep R. Kothadiya, Aayushi Chaudhari, Ruchita Macwan, Krishna Patel, C. Bhatt
{"title":"The Convergence of Deep Learning and Computer Vision: Smart City Applications and Research Challenges","authors":"Deep R. Kothadiya, Aayushi Chaudhari, Ruchita Macwan, Krishna Patel, C. Bhatt","doi":"10.2991/ahis.k.210913.003","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.003","url":null,"abstract":"In recent years, deep learning strategies started to outshine traditional machine learning methods in a few fields, with Computer Vision being one of the most noticeable ones. The Computer Vision is becoming more suitable nowadays at identifying patterns from images than the human visual cognitive system. It ranges from raw information recording to methods and ideas that span digital image processing, machine learning, and computer graphics. The wide utilization of Computer Vision has attracted many researchers to incorporate their ideas with different fields and disciplines. The era of smart cities has emerged to meet the recent demands of citizens using information and communication technology. This paper reviews research efforts that utilize Deep Learning Frameworks and Computer Vision Applications in support of smart city applications like smart healthcare, smart transportation, smart agriculture, etc. Furthermore, the paper identified key research challenges that emanate from the use of deep learning and computer vision in support of smart city services.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"More Accurate Organ Recipient Identification Using Survey Informatics of New Age Technologies","authors":"Benita Jose Chalissery, V. Asha, B. M. Sundaram","doi":"10.2991/ahis.k.210913.002","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.002","url":null,"abstract":"Organ transplantation is a miraculous achievement for most of the end-stage diseases caused due to organ failure. Providing the organ to the most accurate recipient is always a challenge. The survival prediction of the recipient based on various health and environmental/infrastructural data (e.g.: live traffic) is not considered in the current selection algorithms, thus reducing the healthy lifespan of the recipient. The objective of this research is to do an in-depth analysis of the historical transplantation data for the organ (kidney) and figure out statistical evidence of various parameters which are affecting the survival time of the organ recipient. Both univariant and covariant analysis (impact in conjunction with other varying parameters) of these data parameters are studied. The result of this study was further analyzed to identify such parameters which vary frequently with time but also impact the predicted survival curve of the recipient. The research focuses on the benefit of new-age technology such as IoT in accurately predicting the most suitable recipient with a longer survival curve. The research ultimately wants to bring out an efficient recipient identification mechanism for organ procurement and transplantation","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anjali, R. B. Kshiteesh, UH Rohan Koundinya, R. Varun, A. Ajina, G. Prathima
{"title":"A Review on Challenges and Latest Trends on Cyber Security Using Text Cryptography","authors":"Anjali, R. B. Kshiteesh, UH Rohan Koundinya, R. Varun, A. Ajina, G. Prathima","doi":"10.2991/ahis.k.210913.024","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.024","url":null,"abstract":"In the IT sector, an important role is played by Cyber Security. Securing information has become one of the biggest challenges even today. The cybercrimes are growing enormously bit by bit and many measures are taken to prevent cyber-crimes. Despite these dealings, cybersecurity is still a tremendous apprehension to many. So, this paper emphasizes encounters met by cybersecurity and the modern cyber security performances using text cryptography. The secured way of transmission of data over the network from security attacks is using cryptography. This paper explores different cryptographic approaches to improve data security and performance evaluation metrics. The notable ones among them like Playfair, BCD encoded key management and Blowfish operate on discrete techniques of their own. Unlike the conventional encryption schemes which focus on improving algorithms for the text message, the BCD method aims at enriching the algorithm for key generation. The Blowfish functions on subkey generation and permutation for data encryption.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Invigilation Using Computer Vision","authors":"M. Malhotra, I. Chhabra","doi":"10.2991/ahis.k.210913.017","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.017","url":null,"abstract":"Educational institutions determine students’ strengths and weaknesses through exams. Students find numerous ways to cheat in physical exams like exchanging their sheets, using hidden notes, getting good grades, fulfilling their parents’ expectations, and whatnot. Due to the physical limitations of human supervisors, typical invigilation methods cannot conduct successful exams while maintaining their integrity. An automated method based on computer vision to detect anomalous activities during exams is proposed in this study. This study centers around invigilating students’ suspicious behaviour during physical exams through closed-circuit television (CCTV) cameras. The proposed method uses You Only Look Once (YOLOv3) with residual networks as the backbone architecture to inspect cheating in exams. The obtained results show the credibility and efficiency of the proposed method. The experimental results are promising and demonstrate the invigilation of the students in the examination. In this work, achieve 88.03% accuracy for the detection of cheating in the classroom environment","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prishita Ray, Tanmayi Nandan, Lahari Anne, K. A. Kumar
{"title":"A New Combined Model with Reduced Label Dependency for Malware Classification","authors":"Prishita Ray, Tanmayi Nandan, Lahari Anne, K. A. Kumar","doi":"10.2991/ahis.k.210913.004","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.004","url":null,"abstract":"With the technological advancements in recent times, security threats caused by malware are increasing with no bounds. The first step performed by security analysts for the detection and mitigation of malware is its classification. This paper aims to classify network intrusion malware using new-age machine learning techniques with reduced label dependency and identifies the most effective combination of feature selection and classification technique for this purpose. The proposed model, L2 Regularized Autoencoder Enabled Ladder Networks Classifier (RAELN-Classifier), is developed based on a combinatory analysis of various feature selection techniques like FSFC, variants of autoencoders and semisupervised classification techniques such as ladder networks. The model is trained and tested over UNSW-NB15 and benchmark NSL-KDD datasets for accurate real time model performance evaluation using overall accuracy as well as per-class accuracy and was found to result in higher accuracy compared to similar baseline and state-of-the-art models.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126286072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Cross of Intra and Inter Modalities for Visual Question Answering","authors":"Rishav Bhardwaj","doi":"10.2991/ahis.k.210913.007","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.007","url":null,"abstract":"Visual Question Answering (VQA) has recently attained interest in the deep learning community. The main challenge that exists in VQA is to understand the sense of each modality and how to fuse these features. In this paper, DXMN (Deep Cross Modality Network) is introduced which takes into consideration not only the inter-modality fusion but also the intra-modality fusion. The main idea behind this architecture is to take the positioning of each feature into account and then recognize the relationship between multi-modal features as well as establishing a relationship among themselves in order to learn them in a better way. The architecture is pretrained on question answering datasets like, VQA v2.0, GQA, and Visual Genome which is later fine-tuned to achieve state-of-the-art performance. DXMN achieves an accuracy of 68.65 in test-standard and 68.43 in test-dev of VQA v2.0 dataset.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alisha Kulkarni, Archith Vinod Kariyal, V. Dhanush, Paras Nath Singh
{"title":"Speech to Indian Sign Language Translator","authors":"Alisha Kulkarni, Archith Vinod Kariyal, V. Dhanush, Paras Nath Singh","doi":"10.2991/ahis.k.210913.035","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.035","url":null,"abstract":"A Sign Language is a non-verbal communication system in which people communicates by visually transferring sign patterns to express their meaning. A large section of the hearing and speech impaired in India uses Indian Sign Language (ISL) as their mode of communication. Recognition of sign language was significant not only from a technical standpoint but also in terms of societal influence. An automatic speech-to-ISL translation system could help the hearingimpaired access more information and services due to the inherent limitations of communicating through written texts. Furthermore, the system can be utilised as an educational tool to learn ISL in addition to improving information access. This paper intends to bridge the gap by providing a system that anybody can use without having to learn ISL.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel
{"title":"Quality Characteristics of an LMS UX Psychomotor Model for the Design and Evaluation of Learning Management Systems","authors":"Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel","doi":"10.2991/ahis.k.210913.030","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.030","url":null,"abstract":"In this study an investigation was conducted to ascertain the possibility of conceptualizing and developing a native user experience psychomotor model for the design and evaluation of the experiences of learning management systems (LMSs) users. The paper found that no previous model of this kind is in existence. Sequel to this discovery, a conceptualization of the model was done using the psychomotor component of the Bloom’s learning taxonomy. The study then captured suitable dimensions/quality elements that best define/influence the model. These dimensions and quality elements include interactivity, engageability, ludicity, and sociability. The study hence proposes the adoption of this novel UX psychomotor model for the design and evaluation of the user experiences of LMS platforms learners.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131664467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}