Recent Trends in Intensive Computing最新文献

筛选
英文 中文
Restoring and Enhancing Degraded Underwater Pipelines for Identifying and Detecting Corrosion 修复与加固水下退化管道的腐蚀识别与检测
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210249
Vaibhav A. Parjane, Mohit Gangwar
{"title":"Restoring and Enhancing Degraded Underwater Pipelines for Identifying and Detecting Corrosion","authors":"Vaibhav A. Parjane, Mohit Gangwar","doi":"10.3233/apc210249","DOIUrl":"https://doi.org/10.3233/apc210249","url":null,"abstract":"Detection of corrosion from underwater images is necessary for oil and gas pipelines to eliminate the internal leakages and hazards. The tests utilized a broad range of underwater pictures of various situations. A modern technique for estimating subsea pipeline corrosion based on the colour of the corroded pipe. For corrupted underwater videos, an image reconstruction and enhancement algorithm is created as a preliminary phase. The created algorithm reduces blurring and improves picture colour and contrast. The improved colours in the imaging details aid in the method of corrosion estimation. In this work we proposed a underwater corrosion detection using image processing techniques. Some machine learning and deep learning techniques have been used for classification of corrosion. In experimental analysis various features have been evaluated for detection of corrosion and it introduces better classification accuracy than traditional approaches.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real Time Tracing and Alerting System for Vehicles and Children to Ensure Safety and Security Using Labview 基于Labview的车辆与儿童安全实时跟踪报警系统
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210177
Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya
{"title":"Real Time Tracing and Alerting System for Vehicles and Children to Ensure Safety and Security Using Labview","authors":"Dr. R. Deepalakshmi, Dr. R. Vijayalakshmi, S. Lavanya, T. K. R. Rasmi, S. B. Sathiya","doi":"10.3233/apc210177","DOIUrl":"https://doi.org/10.3233/apc210177","url":null,"abstract":"The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of Computer Assisted Instruction in Higher Educational Organization 计算机辅助教学在高等教育机构中的部署
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210229
N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan
{"title":"Deployment of Computer Assisted Instruction in Higher Educational Organization","authors":"N. Chougale, K. Kharade, S. Kharade, S. Ghatage, Mallappa G. Mendagudli, S. Yuvaraj, K. Vengatesan","doi":"10.3233/apc210229","DOIUrl":"https://doi.org/10.3233/apc210229","url":null,"abstract":"The current study looked at how computers help students of different reading abilities. Studies have been conducted on the effect of computers on educational achievement and attitudinal levels. During this study, we have gone through the impact of Bloom’s taxonomy over the conventional system and then focused on integrating CAI in higher education. This research is branching out to encompass the use of computers in the education system. The paper aims to outline and elaborate on the way computers aid every department of life, including education. Information is much more valuable when presented within the context of education or training. Teaching to reflect well is known as “advance” teaching. This research paper is concerned with the educational faculties, facilities, and the organizational structure of the educational process. This study aims to focus on CAI to improve the quality of higher education in India. We have also discussed the areas where we can implement this technology","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wide Survey on Data Mining Approach for Crop Diseases Detection and Prevention 作物病害检测与预防的数据挖掘方法综述
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210239
V. N. Nirgude, S. Malik
{"title":"A Wide Survey on Data Mining Approach for Crop Diseases Detection and Prevention","authors":"V. N. Nirgude, S. Malik","doi":"10.3233/apc210239","DOIUrl":"https://doi.org/10.3233/apc210239","url":null,"abstract":"India is agriculture land and major revenue manufacturing sector. However, because of amendment in temporal parameters and uncertainty in climate directly have an effect on quality and amount of the assembly and maintenance of crops. Also, quality even a lot of degrade once the crops area unit infected by any malady. The main focus of this analysis in agriculture is to increment the crop quality and potency at lower price and gain profit as result of in India the majority of the population depends on agriculture. Big selection of fruits is growing up in India such as apple, banana, guava, grape, mango, pomegranate, orange is the main one. Fruit production gives around 20% of the country’s development. However, because of absence of maintenance, inappropriate development of fruits and manual investigation there has been scale back in generate the standard of fruits.So, Data Mining Approach used in the agriculture domain to resolve several agricultural issues of classification or prediction. During this paper complete survey of several data mining approach for crop disease management has been done. Detection of disease in early state will improve in quality of crop still as decrease the production cost. Also, we can improve the production of the particular crop. Several major parameters are used for the crop disease classification or prediction.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices 使用EMR、EHR和健康监测设备安全医疗保健数据的威胁模型
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210259
Ra. Kamalaeswari, V. Ceronmani Sharmila
{"title":"Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices","authors":"Ra. Kamalaeswari, V. Ceronmani Sharmila","doi":"10.3233/apc210259","DOIUrl":"https://doi.org/10.3233/apc210259","url":null,"abstract":"The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Fake Video Using Smart Contracts and SHA Algorithm 基于智能合约和SHA算法的假视频识别
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210227
SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav
{"title":"Identification of Fake Video Using Smart Contracts and SHA Algorithm","authors":"SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav","doi":"10.3233/apc210227","DOIUrl":"https://doi.org/10.3233/apc210227","url":null,"abstract":"Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Underground Sensor Network for Monitoring Various Fields Using Magnetic Induction 利用磁感应监测各种磁场的无线地下传感器网络
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210297
P. Manigandan, C. Balaji, M. Ramanan, S. Ragul
{"title":"Wireless Underground Sensor Network for Monitoring Various Fields Using Magnetic Induction","authors":"P. Manigandan, C. Balaji, M. Ramanan, S. Ragul","doi":"10.3233/apc210297","DOIUrl":"https://doi.org/10.3233/apc210297","url":null,"abstract":"The frequent accidents of mining safety caused severe losses and massive cost losses. The global mining sector urgently needs to improve operational efficiency and the overall safety of mines. This article suggests a WUSN based mining safety monitoring. The monitoring system collects temperature, moisture, soil vibration and gas values around the mine, and then transmits the data through wireless underground sensor network. Here Transmission based on magnetic induction (MI) is being suggested, in this approach soil is medium for communication so based on the soil conductivity the measured information are transferred. It is also an early warning system, which will help all miners in the mine to save their lives before a victim happens.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preprocessing and Skull Stripping of Brain Tumor Extraction from Magnetic Resonance Imaging Images Using Image Processing 基于图像处理的磁共振成像图像中脑肿瘤提取的预处理与颅骨剥离
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210208
Shweta B. Suryawanshi, S. B. Patil
{"title":"Preprocessing and Skull Stripping of Brain Tumor Extraction from Magnetic Resonance Imaging Images Using Image Processing","authors":"Shweta B. Suryawanshi, S. B. Patil","doi":"10.3233/apc210208","DOIUrl":"https://doi.org/10.3233/apc210208","url":null,"abstract":"Many neuroimaging processing functions believe the preprocessing and skull strip (SS) to be an important step in brain tumor diagnosis. For complex physical reasons intensity changes in brain structure and magnetic resonance imaging of the brain, a proper preprocessing and SS is an important part. The method of removing the skull is relayed to the taking away of the skull area in the brain for medical investigation. It is more correct and necessary techniques for distinguishing between brain regions and cranial regions and this is believed a demanding task. This paper gives detailed review on the preprocessing and traditional transition to machine learning and deep learning-based automatic SS techniques of magnetic resonance imaging.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Image Segmentation Method for Image Processing 图像处理中的图像分割方法研究
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210223
S. Prabu, J. Gnanasekar
{"title":"A Study on Image Segmentation Method for Image Processing","authors":"S. Prabu, J. Gnanasekar","doi":"10.3233/apc210223","DOIUrl":"https://doi.org/10.3233/apc210223","url":null,"abstract":"Image processing techniques are essential part of the current computer technologies and that it plays vital role in various applications like medical field, object detection, video surveillance system, computer vision etc. The important process of Image processing is Image Segmentation. Image Segmentation is the process of splitting the images into various tiny parts called segments. Image processing makes to simplify the image representation in order to analyze the images. So many algorithms are developed for segmenting images, based on the certain feature of the pixel. In this paper different algorithms of segmentation can be reviewed, analyzed and finally list out the comparison for all the algorithms. This comparison study is useful for increasing accuracy and performance of segmentation methods in various image processing domains.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
#Vaccine: Using Hashtags from Indian Tweets to Capture and Analyse the Sentiments of People on Vaccination for Covid’19 Pandemic #疫苗:使用印度推特上的标签来捕捉和分析人们对Covid - 19大流行疫苗接种的情绪
Recent Trends in Intensive Computing Pub Date : 2021-12-01 DOI: 10.3233/apc210183
K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy
{"title":"#Vaccine: Using Hashtags from Indian Tweets to Capture and Analyse the Sentiments of People on Vaccination for Covid’19 Pandemic","authors":"K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy","doi":"10.3233/apc210183","DOIUrl":"https://doi.org/10.3233/apc210183","url":null,"abstract":"To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信