2022 IEEE World Conference on Applied Intelligence and Computing (AIC)最新文献

筛选
英文 中文
Solving Speed Reducer Design Problem by Memorized Differential Evolution 用记忆差分进化法求解减速器设计问题
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848936
Raghav Prasad Parouha
{"title":"Solving Speed Reducer Design Problem by Memorized Differential Evolution","authors":"Raghav Prasad Parouha","doi":"10.1109/AIC55036.2022.9848936","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848936","url":null,"abstract":"Real-life optimization problems (RLOPs) are common in numerous research disciplines. In literature, evolutionary algorithms (EAs) have been deemed an emerging field to solve RLOPs. Among popular EAs, Differential Evolution (DE) is clever algorithm to solve RLOPs. DE and its varied alternatives are highly influenced by improper operators like mutation and crossover. Mostly, DE doesn’t compel to learn the optimum properties achieved in primary phase of the former aristocrats. In this article, a new DE (named as mbDE) created on memory mechanism is offered to solve a renowned RLOP, specifically speed reducer design. It enclosed different crossover & mutation (swarm, crossover and mutation) made through particle swarm optimization (PSO) context. Experimental outcomes endorse the competency of mbDE over various procedures.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis of Fruit Fly-Inspired Multi-Robot Cooperative Algorithm for Target Search and Rescue 果蝇启发的多机器人目标搜救协同算法比较分析
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848813
Vikram Garg, R. Tiwari, A. Shukla
{"title":"Comparative Analysis of Fruit Fly-Inspired Multi-Robot Cooperative Algorithm for Target Search and Rescue","authors":"Vikram Garg, R. Tiwari, A. Shukla","doi":"10.1109/AIC55036.2022.9848813","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848813","url":null,"abstract":"In an unforeseen or human-made disaster, any search and rescue agency’s primary concern are to locate the survivor immediately. For the victim’s survival, even minutes may play a critical part. To strengthen the performance of the SAR community, the research community could introduce some creative technologies. With faster victim searches, initial assessment and visualization of the environment, and real-time assessment and management of search and rescue operations, multi-robot programs can significantly increase the productivity of search and rescue operations. This article proposes an intelligent algorithm based on the fruit fly optimization algorithm’s food search pattern. To update the fruit flies’ position and speed, it uses particle swarm optimization. Repeated research simulations have confirmed the feasibility of the proposed process in a forest-like environment. The simulation results under different scenarios and performance comparison with existing techniques show the proposed algorithm’s accuracy and robustness to be quite efficient in terms of detection rate and search and rescue time. The detection rate improves 10-25% and search and rescue time by 5 to 15%.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129230235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heart Rate Prediction from Human Speech using Regression Models 基于回归模型的人类语音心率预测
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848913
S. Redekar, Aditi Sawant, Rajkumar Kolanji, Nirmit Sawant
{"title":"Heart Rate Prediction from Human Speech using Regression Models","authors":"S. Redekar, Aditi Sawant, Rajkumar Kolanji, Nirmit Sawant","doi":"10.1109/AIC55036.2022.9848913","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848913","url":null,"abstract":"The heart and the mind are intimately connected. Negative states of mind, including depression, anxiety, loneliness, anger, and chronic stress, may increase the risk for heart disease over time or worsen heart issues that already exist. Heart Rate (HR) monitor is a term used to describe a device that monitors and records the HR in real time. Electrode leads linked to the chest were utilized in the early types of HR monitors. We thought of whether and if possible, the way we speak can be used to predict HR. As we know, speech is affected by the emotional environment so we can not only rely on the basic classification of speech so, we need to consider other factors to analyze and predict. This is where the spectral features come into the picture, one of them being MFCC. So, we move away from a conventional model to prove that your voice does depict and give what your HR is. Voice-based detection of HR is attractive because it does not require any additional sensors. In contrast to previous studies, we use real-time speech data as input. Regression is used when we can have the output over a range of values of the class label. In our case, it is the heart rate that can vary over a range of 60 to 130 in ideal conditions. We decided to compare various algorithms under regression and find the one with the best accuracy Results using random forest show modest but significant effects on HR predictions.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115197646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome from IEEE AIC 2022 General Chair 欢迎来自IEEE AIC 2022的总主席
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/aic55036.2022.9848849
{"title":"Welcome from IEEE AIC 2022 General Chair","authors":"","doi":"10.1109/aic55036.2022.9848849","DOIUrl":"https://doi.org/10.1109/aic55036.2022.9848849","url":null,"abstract":"","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Multi-Module Machine Learning System to Identify Clinically Important Traumatic Brain Injuries in Children 开发多模块机器学习系统以识别临床重要的儿童创伤性脑损伤
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848900
Melody Yin
{"title":"Developing a Multi-Module Machine Learning System to Identify Clinically Important Traumatic Brain Injuries in Children","authors":"Melody Yin","doi":"10.1109/AIC55036.2022.9848900","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848900","url":null,"abstract":"Clinically important traumatic brain injuries (ciTBI) are a major health concern, yet early recognition is challenging. This research developed a multi-module machine learning system for efficient pre-screening and diagnosis with improved specificity. The study achieved a lower false positive rate and reduced unnecessary computed tomography (CT) scans, which pose risks especially for children. This system consists of three independent modules intended to assist ciTBI diagnosis. Module 1 prescreens patients using clinical metrics to determine if a CT scan is necessary, reaching specificities of 98.85% and 98.73% and positive predictive values 32.43% and 33.33% for ages under and over 2, respectively, better than previous reports. Module 2, a hybrid model, integrates clinical metrics and CT scans to predict ciTBI. Accuracy reached 99.08% and 99.28%, specificity 99.21% and 99.48%, and NPV 99.86% and 99.78% for the respective age groups, further improving previous results. Module 3 used CNNs to detect CT image abnormalities, achieving an accuracy of 86.56% and AUC ROC of 83.79%. The proposed system demonstrated the ability to improve current ED procedural efficiency by detecting higher risk cases with low false negative rate for early recognition and management.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Feature Engineering for Automated Short Answer Grading 特征工程在自动简答评分中的比较研究
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848851
Patil Shweta, K. Adhiya
{"title":"Comparative Study of Feature Engineering for Automated Short Answer Grading","authors":"Patil Shweta, K. Adhiya","doi":"10.1109/AIC55036.2022.9848851","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848851","url":null,"abstract":"Recent advancement in the field of Natural Language Processing (NLP) has shown promising results in numerous NLP applications. Automated Short Answer Grading (ASAG) is one of the challenging applications of NLP. Understanding the underlying context and semantics in text will help to evaluate short answer responses and predict the scores more similar to human evaluator. Training machine to understand the domain knowledge of courses and utilize the same for evaluation has demanded for more robust method to generate word vectors which are capable of understanding the meaning of words based on context. In this paper we have studied and experimented with already existing word vector generation techniques TF-IDF, word2vec and BERT. Along with the pre-trained word2vec we have computed domain specific word vectors too. Finally, by the utilization of XGBoost we have computed the category of student answer. The comparison of similarity between human evaluated category and category generated by all studied embedding technique along with XGBoost algorithm is computed with the help of Quadratic Weighted Kappa. The results have shown that domain specific embedding will help to predict correct category of student answer.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Security in IoT Networks using Software-Defined Networking: A Review 使用软件定义网络的物联网网络中的数据安全:综述
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848896
S. Shah, Raghav Sharma, N. Shukla
{"title":"Data Security in IoT Networks using Software-Defined Networking: A Review","authors":"S. Shah, Raghav Sharma, N. Shukla","doi":"10.1109/AIC55036.2022.9848896","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848896","url":null,"abstract":"Wireless Sensor networks can be composed of smart buildings, smart homes, smart grids, and smart mobility, and they can even interconnect all these fields into a large-scale smart city network. Software-Defined Networking is an ideal technology to realize Internet-of-Things (IoT) Network and WSN network requirements and to efficiently enhance the security of these networks. Software defines Networking (SDN) is used to support IoT and WSN related networking elements, additional security concerns rise, due to the elevated vulnerability of such deployments to specific types of attacks and the necessity of inter-cloud communication any IoT application would require. This work is a study of different security mechanisms available in SDN for IoT and WSN network secure communication. This work also formulates the problems when existing methods are implemented with different networks parameters.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis on Ensemble Learning Techniques for Groundwater Quality Assessment of Chhattisgarh Region 恰蒂斯加尔邦地下水水质评价的集合学习技术比较分析
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848863
Anushree Shrivastava, Mridu Sahu, D. Jhariya
{"title":"Comparative Analysis on Ensemble Learning Techniques for Groundwater Quality Assessment of Chhattisgarh Region","authors":"Anushree Shrivastava, Mridu Sahu, D. Jhariya","doi":"10.1109/AIC55036.2022.9848863","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848863","url":null,"abstract":"Groundwater is considered to be an essential resource for freshwater in Chhattisgarh. The importance of groundwater leads to a concern about water quality because the bad quality of water may lead to an unhealthy life. In this paper, we have used the numerous techniques of Ensemble Learning- (namely, Stacking, Bagging, and Boosting) for the classification of groundwater based on the Water Quality Index. The Stacking has been done by combining the following Classification Models Logistic Regression, k-Nearest Neighbors, Decision Tree, Support Vector Machine, and Naive Bayes. Bagging has been done using Bagged Decision Trees, Random Forest, and Extra Trees. Boosting has been performed using AdaBoost and Stochastic Gradient Boosting. Further, a comparative analysis of the performance of these Ensemble Learning Techniques has been presented. It has been observed that the maximum accuracy for classification has been given by the Stacking, Bagged Decision Trees, and Gradient Boosting with an accuracy of 0.9953.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic Image Segmentation using CNN (Convolutional Neural Network) based Technique 基于卷积神经网络的语义图像分割技术
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848977
B. Mahmud, G. Hong
{"title":"Semantic Image Segmentation using CNN (Convolutional Neural Network) based Technique","authors":"B. Mahmud, G. Hong","doi":"10.1109/AIC55036.2022.9848977","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848977","url":null,"abstract":"Segmenting images makes computer vision applications more manageable. By breaking an image into smaller groups called “image segments,” an image segmentation approach simplifies the complexity of an image for later processing or analysis. Individual pixels are labeled as part of the process known as segmentation. Many computational research, modeling, and forecasts require a sufficient microstructure sample. An alternate method is to extrapolate a 2D image into a virtual 3D sample, which saves time and money compared to collecting 3D microstructural images. A CNN Architecture-based U-NET technique was used to find extrapolation-based reconstructions for alloys, porous media, and sandstones. Using a deep convolutional neural network, VGG16, the objective function in this optimization is built using microstructural properties. We use a permutation operator to create multiclass feature maps from these stacks. Sandstone datasets, which contain a number of unique materials, are used to demonstrate the actual application of our technique. Pre-annotated data was used to guide our analysis. Image reconstruction is a commonly used approach in various fields for deciphering the many objects in a picture. Using U-NET, we first segment the photographs and then reassemble the image slices to be shown. The overall IoU and accuracy rates for this suggested design were both high, at 85% and 96%, respectively.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114505944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review on Secutity in Internet of Things 物联网安全研究综述
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) Pub Date : 2022-06-17 DOI: 10.1109/AIC55036.2022.9848853
Eisha Akanksha, A. Javali, Jyoti
{"title":"A review on Secutity in Internet of Things","authors":"Eisha Akanksha, A. Javali, Jyoti","doi":"10.1109/AIC55036.2022.9848853","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848853","url":null,"abstract":"Internet of Things (IoT) enables massive interconnectivity and interoperability between devices. With the growing number of devices, higher level of information exchange between the connected entities becomes possible. However, at the same time the sensitive information pertaining to the nodes becomes prone to security and privacy attacks. This is a serious topic in the IoT due to the large number of interconnections. In this paper, the detailed layer wise security vulnerabilities are enumerated. The security architecture of the IoT is presented. The solutions to the possible security attacks are detailed which will be a helping hand for the researchers working in this direction. The current state of the operational technology (OT)security is included.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信