0% found this document useful (0 votes)
4 views

Assignment-1

This document presents a collection of research papers by a team of students focusing on various applications of technology, including Big Data, intrusion detection systems, deepfake detection, and hand gesture recognition. Each paper outlines objectives, technologies used, limitations, and conclusions, highlighting the transformative potential of these technologies in fields like business intelligence, cybersecurity, and human-computer interaction. The studies emphasize the need for improved methodologies and technologies to address existing challenges and enhance performance in real-world applications.

Uploaded by

Shubham Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Assignment-1

This document presents a collection of research papers by a team of students focusing on various applications of technology, including Big Data, intrusion detection systems, deepfake detection, and hand gesture recognition. Each paper outlines objectives, technologies used, limitations, and conclusions, highlighting the transformative potential of these technologies in fields like business intelligence, cybersecurity, and human-computer interaction. The studies emphasize the need for improved methodologies and technologies to address existing challenges and enhance performance in real-world applications.

Uploaded by

Shubham Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

TEAMMATES:

 Shubham Kumar (21BCS9720)


 Vijay Raj (21BCS9714)
 Kaushik Kumar Jha (21BCS9691)
 Rohin Raj Singh (21BCS9761)
 Md. Gauhar (21bcs9697)
 Anurag Aditya (21bcs9749)
ABSTRACT

Big Data has emerged as a principal driver in the digital era, playing a crucial
role in decision-making in various business sectors. This scholarly article
examines the crucial role of Big Data, emphasizing its transformative impact on
business intelligence, process optimization, and innovation. With large volumes
of data, business entities can gain useful insights, identify patterns, and take
informed decisions that assist in strategic planning and competitiveness. The
article examines how analysis of Big Data enables business entities to predict
patterns in the market, manage resource allocation, and deliver better customer
experiences. The article also examines challenges in using Big Data, such as
ensuring privacy of data, security breaches, and a need for sophisticated
analytical tools. The article also looks at using cloud computing and artificial
intelligence in processing large volumes of data in a more productive manner.
In a review of existing literature and actual case studies, the article unearths the
transformative application of Big Data in various sectors such as healthcare,
finance, retail, manufacturing, and logistics. The article also examines new
trends such as using machine learning algorithms and predictive analysis that
are revolutionizing the application of Big Data in the future. The analysis results
indicate a need for business entities to apply robust data management systems
and invest in new technologies to be competitive in a more data-oriented
business setup. By providing a complete picture of the potential of Big Data,
this paper allows a better appreciation of its strategic potential and encourages
more studies of its applications in a dynamic digital age.
1. Shubham Kumar
Paper: Sign Detection Using Modern Technologies
Objective: This paper addresses the real-time detection of traffic
participants, crucial for autonomous vehicles. Traditional computer vision
and machine learning methods struggle with slow response times.
Technologies Used:
YOLOv3 Algorithm: Architecture: Fully Convolutional Neural Network
(CNN) with 106 layers.
Limitations and Areas for Improvement:
Precision and recall were lower than expected due to: Occlusions and
overlapping objects. Heavy traffic scenarios where grid cells detect more
than three objects.
The dataset contained many small and occluded objects, impacting precision
and recall.
Utilizing advanced neural network architectures for better handling of
occlusions and small objects.
Conclusion:
The paper demonstrates that YOLOv3 is a powerful and efficient object
detection algorithm suitable for real-time traffic participant detection in
ADAS systems. By focusing on single-camera input and leveraging CNNs'
parameter-sharing capability, it achieves high accuracy without the
complexity of multi-sensor fusion. However, challenges like occlusions,
overlapping objects, and dataset limitations need to be addressed. Future
work should focus on improving detection precision, leveraging multi-sensor
data, and enhancing neural network architectures for complex driving
scenarios.
2. Vijay Raj

Paper: Multilayered Intrusion Detection.

Objective: To develop a Multi-Layered Intrusion Detection System (ML-IDS) that enhances


detection accuracy and reduces false positives by utilizing ensemble learning techniques (bagging
and boosting). The system optimizes multiple detection layers, each targeting specific threats, and is
evaluated against existing datasets and single-layer IDS frameworks to ensure improved
generalization to new attack types.

Scope

The study presents a Multi-Layered Intrusion Detection System (ML-IDS) that integrates
ensemble learning techniques to enhance threat detection accuracy while minimizing false positives.
The system uses a multi-layered approach, incorporating signature-based detection, anomaly
detection, and behavioral analysis, combined with bagging, boosting, and stacking to improve
classification efficiency. The research benchmarks its model against traditional single-layer IDS
frameworks using datasets like KDD Cup 99, NSL-KDD, and CICIDS2017. The proposed system
aims to improve cybersecurity resilience against both known and zero-day attacks by optimizing
machine learning techniques.

Limitations

Despite its advantages, the ML-IDS has some limitations:

 Computational Overhead: The multi-layered structure and ensemble models demand high
processing power, making real-time implementation challenging, particularly in low-
resource environments.
 Data Imbalance: The datasets used in training contain significantly more normal traffic than
attack data, leading to potential biases in model predictions. Techniques like SMOTE
(Synthetic Minority Over-sampling Technique) may be required to balance the dataset.
 Scalability Concerns: While the model is modular, integrating newer attack patterns and
expanding the system in large-scale networks could require further optimization.
 Latency Issues: The additional detection layers increase processing time, making it less
suitable for time-sensitive cybersecurity applications.

Review

The paper demonstrates that ML-IDS enhances detection accuracy and false positive rates
compared to conventional IDS. It effectively mitigates zero-day threats using anomaly-based
detection and ensemble learning. Studies by Ambusaidi et al. (2016), Buczak & Guven (2016), and
Roy et al. (2020) support the claim that ensemble models outperform individual classifiers.
3. Kaushik Kumar Jha
Paper Name- Detecting Deep-Fake Videos Using Deep Learning Models

Objective:

The primary objective of the paper is to develop an advanced deep learning-based


system capable of accurately distinguishing between real videos and deepfake
videos. The proposed system aims to combat the growing threat of deepfakes, which
are used for malicious purposes such as misinformation, political manipulation, and
blackmail. The focus is on creating a robust, real-time detection mechanism that can
be integrated into social media platforms and other digital communication networks.

Technologies Used:

1. Res2Net CNN:
oA Convolutional Neural Network architecture designed to extract multi-
scale features from video frames.
o Captures frame-level appearance features, which are critical for
identifying subtle manipulations in deepfake videos.
2. LSTM (Long Short-Term Memory):
A type of Recurrent Neural Network (RNN) used for sequential data
o
analysis.
o Processes temporal dependencies between video frames to detect
inconsistencies indicative of deepfakes.
3. Composite Dataset:
o Combines videos from FaceForensics++, Deepfake Detection
Challenge, and Celeb-DF datasets.
o Ensures a balanced dataset with 50% real and 50% deepfake videos for
training and testing.
4. Preprocessing Techniques:
o Video segmentation into frames.
o Face detection and cropping to focus on relevant regions.
o Frame selection (e.g., first 50, middle 50, and last 50 frames) to reduce
computational load.

Limitations and Areas for Improvement:


1. Low-Resolution Videos:
o The model struggles with detecting deepfakes in low-resolution videos,
which limits its effectiveness in real-world scenarios where video quality
may vary.
2. Real-Time Performance:
o While the model achieves high accuracy, further optimization is needed
to ensure real-time detection, especially for deployment on mobile
devices or resource-constrained systems.
3. Cross-Domain Generalization:
oThe model is trained on specific datasets (e.g., FaceForensics++ and
Celeb-DF). It may not generalize well to other domains, such as medical
imaging or news broadcasting, without additional training.
4. Audio-Visual Synchronization:
o The current model focuses only on visual features. Incorporating audio
analysis could improve detection accuracy by identifying
inconsistencies between audio and visual elements.
5. Dataset Bias:
o The dataset used for training is balanced but may not fully represent
the diversity of deepfake techniques and scenarios encountered in the
real world.

Conclusion:

The paper presents a robust deepfake detection system that combines Res2Net
CNN for spatial feature extraction and LSTM for temporal analysis. The proposed
model achieves 90% accuracy in distinguishing between real and deepfake videos,
demonstrating its effectiveness in handling challenging cases like face-swapping and
subtle manipulations. However, limitations such as poor performance on low-
resolution videos and the need for real-time optimization highlight areas for future
improvement. The system has significant potential for integration into social media
platforms and other digital communication networks to curb the spread of deepfake
content. Future work should focus on enhancing cross-domain generalization,
incorporating audio-visual synchronization, and optimizing the model for real-time
deployment.
4. Rohin Raj Singh
Paper: Hand Detection using Recent Technologies

Objective:
Real-time hand gesture detection is a fundamental aspect of human-
computer interaction and augmented reality systems. The existing computer
vision and machine learning methods are plagued with slow response time
and accuracy.

Technologies Used:
YOLOv3 Algorithm:
Structure: Fully Convolutional Neural Network (CNN) of 106 layers.

Limitations and Areas of Improvement:

Accuracy and recall were hampered by:


Occlusion and overlapping of hands.
Ambiguity of hand gestures and varying illumination that affect detection
accuracy.
The dataset contained a high number of small and occluded hand gestures,
which affected accuracy and recall.
The use of sophisticated neural network architectures to better handle
occlusion, small objects, and complex hand gestures.
Conclusion:
The paper indicates that YOLOv3 is a highly accurate object detection
algorithm that is suitable for application to real-time hand gesture detection
in human-computer interaction systems. By focusing on a single-camera
input and leveraging CNNs' strength of sharing parameters, it is highly
accurate without the added sophistication of multi-sensor fusion. However,
challenges such as occlusion, overlapping of hands, complex hand gestures,
and dataset limitation need to be better handled. The future work should be
in enhancing detection accuracy, utilizing multi-sensor data,

You might also like