2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)最新文献

筛选
英文 中文
Apache Spark based analysis on word count application in Big Data 基于Apache Spark的词统计在大数据中的应用分析
K. Subha, N. Bharathi
{"title":"Apache Spark based analysis on word count application in Big Data","authors":"K. Subha, N. Bharathi","doi":"10.1109/iciptm54933.2022.9753879","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753879","url":null,"abstract":"The rise in the volume of data, as well as the type of data and the rate at which data is produced, has led to the development of novel processing methods capable of working with such massive amounts of data, termed as Big Data. The most difficult aspects of managing Big Data include its collection and storage, as well as search, sharing, analysis, and visualizations. In this paper explain the characteristics, processing, application of bigdata and its challenges. Also explained how big data support Internet of Things and Cloud computing. By combining big data, IOT, Cloud provides the new architecture.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"491-495"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83725301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image Steganography Approach Based Ant Colony Optimization with Triangular Chaotic Map 基于三角混沌映射蚁群优化的图像隐写方法
Mohan Bhandari, Subash Panday, Chandra Prakash Bhatta, S. Panday
{"title":"Image Steganography Approach Based Ant Colony Optimization with Triangular Chaotic Map","authors":"Mohan Bhandari, Subash Panday, Chandra Prakash Bhatta, S. Panday","doi":"10.1109/iciptm54933.2022.9753917","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753917","url":null,"abstract":"To establish the secure communication using image steganography by hiding the information in cover image, the study focus on image steganography based on Ant Colony Optimization (ACO) where the cover image is divided into number of 5×5 blocks. As pixel values after ACO are considered as the optimal pixels, the ants search the next qualified pixels on reference to pheromone trails to encode the text messages. After ACO, Triangular Chaotic Map (TCM) is imposed based on initial value of chaotic sequences. The proposed method outperformed other state-of-art methods like classical Least Significant Bit(LSB), LSB with ACO, LSB with logistic map for all the images under consideration: lenna.png (0.00046, 83.4021, 0.0007, 0.9990964, 0.9983), baboon.png (0.00027, 82.5526, 0.0009, 0.9990542, 0.9985), pepper.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947), dog.png (0.00045, 70.4590, 0.0005, 0.9990024, 0.9904) and flower.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947) under the evaluation metrics as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Mean Absolute Error (MAE), F-Score and Structural Similarity Index Matrix (SSIM) respectively.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"23 1","pages":"429-434"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83292415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Empirical Analysis of Machine Learning Approaches for Enhancing the Cyber security for better Quality 提高网络安全质量的机器学习方法实证分析
Korakod Tongkachok, V. Samata, Nethravathi K, M. Nirmal, Lakshmikanth Rajat Mohan, Zarrarahmed Khan
{"title":"The Empirical Analysis of Machine Learning Approaches for Enhancing the Cyber security for better Quality","authors":"Korakod Tongkachok, V. Samata, Nethravathi K, M. Nirmal, Lakshmikanth Rajat Mohan, Zarrarahmed Khan","doi":"10.1109/iciptm54933.2022.9754195","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754195","url":null,"abstract":"In recent years, there have been significant advances in both technologies & tactics so in area of cyber security, with (ML) machine learning at the forefront of the transformation. It is the ability to obtain security event characteristics or findings from cyber security information and then develop a matching information model that will allow a security system to become autonomous and smart. The widespread proliferation and the usage of Web and Smartphone applications has increased the size of cyber world as a consequence. When a computerized assault takes too long to complete, the internet becomes vulnerable. Security measures may be improved by recognizing and reacting to cyber-attacks, thanks to cyber security techniques. Security measures that were previously used aren't any longer appropriate because scammers have learned how to evade them. It is getting more difficult to detect formerly unknown and unpredictable security breaches, which are growing more widespread. Cyber security is becoming more dependent on machine learning (ML) techniques. Machine learning algorithms' dependability remains a major challenge, given its continual advancement. It is possible to find malicious hackers in internet that are ready to exploit ML defects that have been made public. A thorough review of machine learning techniques safeguarding cyberspace against attacks is provided in this paper, which presents a literature review on Cyber security using machine learning methods, such as vulnerability scanning, spam filtering, or threat detection on desktop networks as well as smart phone networks. Among other things, this paper provides brief descriptions of each machine-learning technique and security info, essential machine-learning technology, and evaluation parameters for a classification method.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"36 1","pages":"95-100"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89903738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Paint / Writing Application through WebCam using MediaPipe and OpenCV 使用MediaPipe和OpenCV通过WebCam绘制/编写应用程序
Shaurya Gulati, Ashish Kumar Rastogi, Mayank Virmani, Rahul Jana, Raghav Pradhan, Chetan Gupta
{"title":"Paint / Writing Application through WebCam using MediaPipe and OpenCV","authors":"Shaurya Gulati, Ashish Kumar Rastogi, Mayank Virmani, Rahul Jana, Raghav Pradhan, Chetan Gupta","doi":"10.1109/iciptm54933.2022.9753939","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753939","url":null,"abstract":"Writing, a cohesive form of communication that helps us convey our thoughts as efficiently as possible. But in today's modern world, typing is also considered as a way to record information along with writing. Characters or phrases are written withinside the unfastened area with a marker or finger. With the improvement of clever wearable gadgets, the virtual international can now be controlled with the aid of using human gestures. These wearable gadgets can understand and recognize our actions. Recognizing and interpreting a non-stop sequential gesture to circulate from the given set of input statistics is gesture recognition. Gestures are non-verbal information used to enhance laptop language understanding. Human gestures are perceived with the aid of using imaginative and prescient, and laptop imaginative and prescient is used to research diverse gestures. The project takes advantage of this gap and makes a speciality of growing a motion-to-textual content converter that can potentially serve as a program for clever wearable gadgets for writing in the thin air. The device will use the laptop imaginatively and presciently to hint the finger's path, and in that way, it is easy to write from above. The generated textual content also can be used for different purposes, the same as any different content would serve. It will be a whole new means of communication for the deaf as well. It is a powerful communication method that reduces mobile phone and computer utilization with the aid of disposing of what you want to write.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"39 1","pages":"287-291"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91357495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Data Warehousing Using Feature Engineering 基于特征工程的数据仓库研究综述
Lipsa Das, Laxmi Ahuja, V. Chauhan, Akanksha Singh
{"title":"A Review of Data Warehousing Using Feature Engineering","authors":"Lipsa Das, Laxmi Ahuja, V. Chauhan, Akanksha Singh","doi":"10.1109/iciptm54933.2022.9754137","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754137","url":null,"abstract":"Today is an era of online shopping and most of the persons are willing to buy things via internet. The reason behind this they can get lots of options in a single click, there is no need to waste time to waiting up in the queue as well. It is becoming more common in our daily lives. There are lots of algorithms which understand the user's interests and behavior regarding this. In this paper we are presenting feature engineering concept to predict the behavior of customer. Feature engineering allows us to create feature by our self which can be applied on any area. It includes the different stage of process to create feature and after creating the feature in any domain machine learning algorithm can be applied. Data warehousing is also essential to predict any behavior on event and by selecting any event it is easy to take the decision on any event and these predictions can be based on any day or week or months which are also very helpful from industry point of view.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"7 1","pages":"690-696"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75217921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Routing Protocols in Wireless Body Area Network (WBAN) 无线体域网络(WBAN)中路由协议的比较分析
Smita Sharma, M. Tripathi, V. M. Mishra
{"title":"Comparative Analysis of Routing Protocols in Wireless Body Area Network (WBAN)","authors":"Smita Sharma, M. Tripathi, V. M. Mishra","doi":"10.1109/iciptm54933.2022.9754202","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754202","url":null,"abstract":"The emerging technologies in healthcare industries are adopting necessary needs for the treatment of dreadful diseases and clinical diagnoses. At the age of the COVID-19 pandemic where transmission of infection is at severe risk, the treatment of the patient can be done remotely. [1] The progression in the field of healthcare is eminently supported by involving real-time diagnosis and e-treatment of the patients. Digital technologies involved in this diagnosis are Artificial Intelligence, Big Data, Machine Learning, the Internet of Things (IoT), etc. Wireless Body Area Networks (WBANs) are the technology that has accomplished the capability to restructure healthcare and make available pervasive health care support to the patients. Enormous research is ongoing in this area and creating new ideas and technologies to make lives easy, safe, and convenient for the patients and healthcare providers.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"108 1","pages":"703-706"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72880126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Innovative Method for Optimal Detection and Analysis of Phosphate Level in Tamilnadu Water Resources using Extreme Learning Machine Algorithm and Comparing with SVM based on Accuracy and Mean Squared Error Rate 基于极值学习机算法的泰米尔纳德邦水资源磷酸盐水平优化检测分析创新方法及基于准确率和均方错误率的SVM比较
B. Kiran, V. Parthipan
{"title":"An Innovative Method for Optimal Detection and Analysis of Phosphate Level in Tamilnadu Water Resources using Extreme Learning Machine Algorithm and Comparing with SVM based on Accuracy and Mean Squared Error Rate","authors":"B. Kiran, V. Parthipan","doi":"10.1109/iciptm54933.2022.9754098","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754098","url":null,"abstract":"Aim: The Aim of the works involves the predict the structure of function to Improve Innovative Optimal Detection and analysis of phosphate in water resources using an Extreme Learning Machine algorithm (ELM) over Support Vector Machine algorithm (SVM) founded on accuracy and Mean Squared Error rate (MSE). Methods and materials: In this method have taken two algorithms with data samples of each size is $N=5$ and testing and comparing with two algorithms will show greater accuracy. G power 80 % threshold 0.05 %, CI is 95 %. Results and Discussion: Based on the measurement of data, statistical analysis, and independent sample T-test, the significant level is ($P < 0.03$) to produce better accuracy, lower mean squared error rate using ELM algorithm (92%) while comparing to SVM (88%). Conclusion: The method shows reasonable accuracy, selectivity, and comparable extreme learning machine than support vector machine which allows it for nitrate determination in natural water.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"217 1","pages":"616-621"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74874306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Digital Image Forgery Detection 数字图像伪造检测研究进展
Shantanu Pradhan, U. Chauhan, S. Chauhan
{"title":"A Review on Digital Image Forgery Detection","authors":"Shantanu Pradhan, U. Chauhan, S. Chauhan","doi":"10.1109/iciptm54933.2022.9754125","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754125","url":null,"abstract":"The image forgery methods are utilized to give the specific picture as automated pictures without any mistakes in catching of advanced picture data which shows the first picture. While contrasted with ordinary pictures the altered pictures are hard to discover the manufactured pictures. The picture ought to keep up with the credibility and respectability to get the image from unapproved clients. In this paper, we have analyzed the computerized picture imitation and JPEG is the most widely recognized configuration utilized by the visual pictures and the advanced camera gadgets. These activities are acted in an adobe photograph shop utilizing with the substance of picture security to reestablish some computerized picture with a legitimacy and uprightness to recognize the advanced picture imitation utilizing dynamic and detached methods.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"107 1","pages":"697-702"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73676467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Solar-Grid Charging of Electric Vehicle using PI Controller 基于PI控制器的电动汽车太阳能电网充电仿真
S. Goyal, G. Gangil, A. Saraswat
{"title":"Simulation of Solar-Grid Charging of Electric Vehicle using PI Controller","authors":"S. Goyal, G. Gangil, A. Saraswat","doi":"10.1109/iciptm54933.2022.9754003","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754003","url":null,"abstract":"Electric vehicles (EVs) have a number of benefits, one of which is that they reduce carbon emissions. Overloading of the electric grid system and the lack of sufficient charging stations are the two most pressing issues in the electric vehicle industry. The application of solar energy to power the vehicle is the main emphasis of this research. The engine of a solar-powered electric vehicle is powered by the energy stored in the battery, allowing the vehicle to go in any direction. The capacity of a solar panel is evaluated and an electric vehicle charging calculation for one unit is performed. Another key barrier for electric vehicles is the type of converter, battery, and controller necessary to regulate battery charge. This study is divided into three sections: first, modelling the required parameters for an electric car, then simulating the model in MATLAB, and finally, explaining the findings of the evaluation and simulation. In the current study, a PI controller is employed to control the solar/grid charging. The efficacy of the proposed method is validated through simulation model of PI controller.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"75 1","pages":"247-252"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83771287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iciptm54933.2022.9754009","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754009","url":null,"abstract":"","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80782609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信