International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management最新文献

筛选
英文 中文
Facial expression recognition in videos using hybrid CNN & ConvLSTM. 使用混合CNN和ConvLSTM的视频中的面部表情识别。
Rajesh Singh, Sumeet Saurav, Tarun Kumar, Ravi Saini, Anil Vohra, Sanjay Singh
{"title":"Facial expression recognition in videos using hybrid CNN & ConvLSTM.","authors":"Rajesh Singh,&nbsp;Sumeet Saurav,&nbsp;Tarun Kumar,&nbsp;Ravi Saini,&nbsp;Anil Vohra,&nbsp;Sanjay Singh","doi":"10.1007/s41870-023-01183-0","DOIUrl":"10.1007/s41870-023-01183-0","url":null,"abstract":"<p><p>The three-dimensional convolutional neural network (3D-CNN) and long short-term memory (LSTM) have consistently outperformed many approaches in video-based facial expression recognition (VFER). The image is unrolled to a one-dimensional vector by the vanilla version of the fully-connected LSTM (FC-LSTM), which leads to the loss of crucial spatial information. Convolutional LSTM (ConvLSTM) overcomes this limitation by performing LSTM operations in convolutions without unrolling, thus retaining useful spatial information. Motivated by this, in this paper, we propose a neural network architecture that consists of a blend of 3D-CNN and ConvLSTM for VFER. The proposed hybrid architecture captures spatiotemporal information from the video sequences of emotions and attains competitive accuracy on three FER datasets open to the public, namely the SAVEE, CK + , and AFEW. The experimental results demonstrate excellent performance without external emotional data with the added advantage of having a simple model with fewer parameters. Moreover, unlike the state-of-the-art deep learning models, our designed FER pipeline improves execution speed by many factors while achieving competitive recognition accuracy. Hence, the proposed FER pipeline is an appropriate candidate for recognizing facial expressions on resource-limited embedded platforms for real-time applications.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10028317/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9606380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy weighted Bayesian belief network: a medical knowledge-driven Bayesian model using fuzzy weighted rules. 模糊加权贝叶斯信念网络:一种基于模糊加权规则的医学知识驱动贝叶斯模型。
Shweta Kharya, Sunita Soni, Tripti Swarnkar
{"title":"Fuzzy weighted Bayesian belief network: a medical knowledge-driven Bayesian model using fuzzy weighted rules.","authors":"Shweta Kharya,&nbsp;Sunita Soni,&nbsp;Tripti Swarnkar","doi":"10.1007/s41870-022-01153-y","DOIUrl":"https://doi.org/10.1007/s41870-022-01153-y","url":null,"abstract":"<p><p>In this current work, Weighted Bayesian Association rules using the Fuzzy set theory are proposed with the new concept of Fuzzy Weighted Bayesian Association Rules to design and develop a Clinical Decision Support System on the Bayesian Belief Network, which is an appropriate area to work in Clinical Domain as it has a higher degree of unpredictability and causality. Weighted Bayesian Association rules to construct a Bayesian network are already proposed. A \"Sharp boundary\" issue related to quantitative attribute domains may cause erroneous predictions in medicine and treatment in the medical environment. So to eradicate sharp boundary problems in the medical field, the fuzzy theory is applied in attributes to deal with real-life situations. A new algorithm is designed and implemented in this paper to set up a new Bayesian belief network using the concept of Fuzzy Weighted Association rule mining under the Predictive Modeling paradigm named Fuzzy weighted Bayesian belief network using numerous clinical datasets with outshone results.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9838277/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10827078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep ensemble learning for automatic medicinal leaf identification. 基于深度集成学习的药用叶片自动识别。
Silky Sachar, Anuj Kumar
{"title":"Deep ensemble learning for automatic medicinal leaf identification.","authors":"Silky Sachar,&nbsp;Anuj Kumar","doi":"10.1007/s41870-022-01055-z","DOIUrl":"https://doi.org/10.1007/s41870-022-01055-z","url":null,"abstract":"<p><p>The therapeutic nature of medicinal plants and their ability to heal many diseases raises the need for their automatic identification. Different parts of plants that help in their identification include root, fruit, bark, stem but leaf images have been widely used as they are an abundant source of information and are also easily available. This work explores the branch of Artificial Intelligence, called deep learning, and proposes an Ensemble learning approach to rapidly detect medicinal plants using the leaf image. The medicinal leaf dataset consists of 30 classes. Transfer learning approach was used to initialize the parameters and pre-train Neural networks namely MobileNetV2, InceptionV3, and ResNet50. These component models were used to extract features from the input images and the softmax layer connected to the Dense Layer was used as the classifier to train the models on the concerned dataset. The obtained accuracies were validated using threefold and fivefold cross-validation. The Ensemble Deep Learning- Automatic Medicinal Leaf Identification (EDL-AMLI) classifier based on the weighted average of the component model outputs was used as the final classifier. It was observed that the EDL-AMLI outperformed the state-of-the-art pre-trained models such as MobileNetV2, InceptionV3, and ResNet50 by achieving 99.66% accuracy on the test set and average accuracy of 99.9% using threefold and fivefold cross validation.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9373896/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40704043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Group security using ECC. 使用ECC的组安全。
Purna Chandra Sethi, Neelima Sahu, Prafulla Kumar Behera
{"title":"Group security using ECC.","authors":"Purna Chandra Sethi,&nbsp;Neelima Sahu,&nbsp;Prafulla Kumar Behera","doi":"10.1007/s41870-021-00613-1","DOIUrl":"https://doi.org/10.1007/s41870-021-00613-1","url":null,"abstract":"<p><p>Nowadays security is main issue during transmission of data. Among many cryptographic methods, ECC is the public key asymmetric cryptosystem which provides faster computation over smaller size in comparison to other asymmetric key cryptosystems. In this paper, we have proposed a group security algorithm using the ECC cryptography algorithm. The group security is applied to ECC in terms of m-gram selection called ECC m-gram selection. Due to the group security implementation in terms of common grams, processing speed will be faster in comparison to individual item security. We have also made the comparison study between the traditional ECC algorithm with the proposed group security algorithm using generalized frequent-common gram selection for depicting lesser time requirements to achieve better security for the whole process.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s41870-021-00613-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"25446413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Online searching trend on Covid-19 using Google trend: infodemiological study in Malaysia. 使用谷歌趋势在线搜索Covid-19趋势:马来西亚的信息流行病学研究。
Tengku Adil Tengku Izhar, Torab Torabi
{"title":"Online searching trend on Covid-19 using Google trend: infodemiological study in Malaysia.","authors":"Tengku Adil Tengku Izhar,&nbsp;Torab Torabi","doi":"10.1007/s41870-021-00825-5","DOIUrl":"https://doi.org/10.1007/s41870-021-00825-5","url":null,"abstract":"<p><p>Since January 2020, the emergence of Covid-19 has sparked a worldwide search for information about Covid-19. People frequently use the internet to search the information on the virus. However, the pandemic have triggered the information-seeking trends among public. As a result, large amount of information could lead to infodemic. It will create public concerned such as panic and paranoid because this information spread rapidly. The aim of this study is to analyze information about Covid-19 that has been searched in Malaysia. We investigated online search behavior related to the Covid-19 outbreak among public by using Google Trends to understand public searching behavior on Covid-19. The findings from this study can be used as a tool to monitor public searching activities on Covid-19, which could predict future action regarding the outbreak.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8799427/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39895407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A lightweight security framework for electronic healthcare system. 用于电子医疗保健系统的轻量级安全框架。
Ravi Raushan Kumar Chaudhary, Kakali Chatterjee
{"title":"A lightweight security framework for electronic healthcare system.","authors":"Ravi Raushan Kumar Chaudhary,&nbsp;Kakali Chatterjee","doi":"10.1007/s41870-022-01034-4","DOIUrl":"https://doi.org/10.1007/s41870-022-01034-4","url":null,"abstract":"<p><p>Electronic healthcare systems (EHS) are the most emerging field of today's digital world which is used for remote health monitoring, evidence-based treatment, disease prediction, modeling, etc. Many internet of things (IoT) devices and body sensors are involved in such systems for data collection. Every time a cloud-based solution is adopted to collect and preserve collected personal health information. Secure data transmission is a big challenge in such an environment as the devices are memory and power-constrained. This research focuses on a lightweight ciphering mechanism that can be used to secure an electronic healthcare system. Traditional cryptographic solutions are not suitable due to the operational complexity. Some popular lightweight block ciphers which includes SIMON, HEIGHT, LEA, etc. are used in IoT device to increase the speed. Hence, in this paper, we have proposed a lightweight security framework with a flexible key structure to protect the data in the electronic healthcare system. The proposed scheme increases the speed by minimum 4 <math><mo>%</mo></math> with compared to existing literature. Our experimental analysis shows that the proposed technique also have a low computational and communicational load. The brief security analysis using automated validation of internet security protocols and applications (AVISPA) tool shows that the proposed scheme can withstand all network attacks.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9306426/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40660773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Word2vec neural model-based technique to generate protein vectors for combating COVID-19: a machine learning approach. 基于Word2vec神经模型的抗COVID-19蛋白载体生成技术:机器学习方法
Toby A Adjuik, Daniel Ananey-Obiri
{"title":"Word2vec neural model-based technique to generate protein vectors for combating COVID-19: a machine learning approach.","authors":"Toby A Adjuik,&nbsp;Daniel Ananey-Obiri","doi":"10.1007/s41870-022-00949-2","DOIUrl":"https://doi.org/10.1007/s41870-022-00949-2","url":null,"abstract":"<p><p>The world was ambushed in 2019 by the COVID-19 virus which affected the health, economy, and lifestyle of individuals worldwide. One way of combating such a public health concern is by using appropriate, rapid, and unbiased diagnostic tools for quick detection of infected people. However, a current dearth of bioinformatics tools necessitates modeling studies to help diagnose COVID-19 cases. Molecular-based methods such as the real-time reverse transcription polymerase chain reaction (rRT-PCR) for detecting COVID-19 is time consuming and prone to contamination. Modern bioinformatics tools have made it possible to create large databases of protein sequences of various diseases, apply data mining techniques, and accurately diagnose diseases. However, the current sequence alignment tools that use these databases are not able to detect novel COVID-19 viral sequences due to high sequence dissimilarity. The objective of this study, therefore, was to develop models that can accurately classify COVID-19 viral sequences rapidly using protein vectors generated by neural word embedding technique. Five machine learning models; K nearest neighbor regression (KNN), support vector machine (SVM), random forest (RF), Linear discriminant analysis (LDA), and Logistic regression were developed using datasets from the National Center for Biotechnology. Our results suggest, the RF model performed better than all other models on the training dataset with 99% accuracy score and 99.5% accuracy on the testing dataset. The implication of this study is that, rapid detection of the COVID-19 virus in suspected cases could potentially save lives as less time will be needed to ascertain the status of a patient.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9119569/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10334150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Editorial. 社论。
M N Hoda
{"title":"Editorial.","authors":"M N Hoda","doi":"10.1007/s41870-022-01036-2","DOIUrl":"https://doi.org/10.1007/s41870-022-01036-2","url":null,"abstract":"","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9289658/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40534630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low resource 3D U-Net based deep learning model for medical image analysis. 基于低资源3D U-Net的医学图像分析深度学习模型。
Girija Chetty, Mohammad Yamin, Matthew White
{"title":"A low resource 3D U-Net based deep learning model for medical image analysis.","authors":"Girija Chetty,&nbsp;Mohammad Yamin,&nbsp;Matthew White","doi":"10.1007/s41870-021-00850-4","DOIUrl":"https://doi.org/10.1007/s41870-021-00850-4","url":null,"abstract":"<p><p>The success of deep learning, a subfield of Artificial Intelligence technologies in the field of image analysis and computer can be leveraged for building better decision support systems for clinical radiological settings. Detecting and segmenting tumorous tissues in brain region using deep learning and artificial intelligence is one such scenario, where radiologists can benefit from the computer based second opinion or decision support, for detecting the severity of disease, and survival of the subject with an accurate and timely clinical diagnosis. Gliomas are the aggressive form of brain tumors having irregular shape and ambiguous boundaries, making them one of the hardest tumors to detect, and often require a combined analysis of different types of radiological scans to make an accurate detection. In this paper, we present a fully automatic deep learning method for brain tumor segmentation in multimodal multi-contrast magnetic resonance image scans. The proposed approach is based on light weight UNET architecture, consisting of a multimodal CNN encoder-decoder based computational model. Using the publicly available Brain Tumor Segmentation (BraTS) Challenge 2018 dataset, available from the Medical Image Computing and Computer Assisted Intervention (MICCAI) society, our novel approach based on proposed light-weight UNet model, with no data augmentation requirements and without use of heavy computational resources, has resulted in an improved performance, as compared to the previous models in the challenge task that used heavy computational architectures and resources and with different data augmentation approaches. This makes the model proposed in this work more suitable for remote, extreme and low resource health care settings.</p>","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8727483/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39891470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Editorial. 社论。
M N Hoda
{"title":"Editorial.","authors":"M N Hoda","doi":"10.1007/s41870-022-01099-1","DOIUrl":"https://doi.org/10.1007/s41870-022-01099-1","url":null,"abstract":"","PeriodicalId":73455,"journal":{"name":"International journal of information technology : an official journal of Bharati Vidyapeeth's Institute of Computer Applications and Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9484353/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"33485715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信