Assignment-1
Assignment-1
Big Data has emerged as a principal driver in the digital era, playing a crucial
role in decision-making in various business sectors. This scholarly article
examines the crucial role of Big Data, emphasizing its transformative impact on
business intelligence, process optimization, and innovation. With large volumes
of data, business entities can gain useful insights, identify patterns, and take
informed decisions that assist in strategic planning and competitiveness. The
article examines how analysis of Big Data enables business entities to predict
patterns in the market, manage resource allocation, and deliver better customer
experiences. The article also examines challenges in using Big Data, such as
ensuring privacy of data, security breaches, and a need for sophisticated
analytical tools. The article also looks at using cloud computing and artificial
intelligence in processing large volumes of data in a more productive manner.
In a review of existing literature and actual case studies, the article unearths the
transformative application of Big Data in various sectors such as healthcare,
finance, retail, manufacturing, and logistics. The article also examines new
trends such as using machine learning algorithms and predictive analysis that
are revolutionizing the application of Big Data in the future. The analysis results
indicate a need for business entities to apply robust data management systems
and invest in new technologies to be competitive in a more data-oriented
business setup. By providing a complete picture of the potential of Big Data,
this paper allows a better appreciation of its strategic potential and encourages
more studies of its applications in a dynamic digital age.
1. Shubham Kumar
Paper: Sign Detection Using Modern Technologies
Objective: This paper addresses the real-time detection of traffic
participants, crucial for autonomous vehicles. Traditional computer vision
and machine learning methods struggle with slow response times.
Technologies Used:
YOLOv3 Algorithm: Architecture: Fully Convolutional Neural Network
(CNN) with 106 layers.
Limitations and Areas for Improvement:
Precision and recall were lower than expected due to: Occlusions and
overlapping objects. Heavy traffic scenarios where grid cells detect more
than three objects.
The dataset contained many small and occluded objects, impacting precision
and recall.
Utilizing advanced neural network architectures for better handling of
occlusions and small objects.
Conclusion:
The paper demonstrates that YOLOv3 is a powerful and efficient object
detection algorithm suitable for real-time traffic participant detection in
ADAS systems. By focusing on single-camera input and leveraging CNNs'
parameter-sharing capability, it achieves high accuracy without the
complexity of multi-sensor fusion. However, challenges like occlusions,
overlapping objects, and dataset limitations need to be addressed. Future
work should focus on improving detection precision, leveraging multi-sensor
data, and enhancing neural network architectures for complex driving
scenarios.
2. Vijay Raj
Scope
The study presents a Multi-Layered Intrusion Detection System (ML-IDS) that integrates
ensemble learning techniques to enhance threat detection accuracy while minimizing false positives.
The system uses a multi-layered approach, incorporating signature-based detection, anomaly
detection, and behavioral analysis, combined with bagging, boosting, and stacking to improve
classification efficiency. The research benchmarks its model against traditional single-layer IDS
frameworks using datasets like KDD Cup 99, NSL-KDD, and CICIDS2017. The proposed system
aims to improve cybersecurity resilience against both known and zero-day attacks by optimizing
machine learning techniques.
Limitations
Computational Overhead: The multi-layered structure and ensemble models demand high
processing power, making real-time implementation challenging, particularly in low-
resource environments.
Data Imbalance: The datasets used in training contain significantly more normal traffic than
attack data, leading to potential biases in model predictions. Techniques like SMOTE
(Synthetic Minority Over-sampling Technique) may be required to balance the dataset.
Scalability Concerns: While the model is modular, integrating newer attack patterns and
expanding the system in large-scale networks could require further optimization.
Latency Issues: The additional detection layers increase processing time, making it less
suitable for time-sensitive cybersecurity applications.
Review
The paper demonstrates that ML-IDS enhances detection accuracy and false positive rates
compared to conventional IDS. It effectively mitigates zero-day threats using anomaly-based
detection and ensemble learning. Studies by Ambusaidi et al. (2016), Buczak & Guven (2016), and
Roy et al. (2020) support the claim that ensemble models outperform individual classifiers.
3. Kaushik Kumar Jha
Paper Name- Detecting Deep-Fake Videos Using Deep Learning Models
Objective:
Technologies Used:
1. Res2Net CNN:
oA Convolutional Neural Network architecture designed to extract multi-
scale features from video frames.
o Captures frame-level appearance features, which are critical for
identifying subtle manipulations in deepfake videos.
2. LSTM (Long Short-Term Memory):
A type of Recurrent Neural Network (RNN) used for sequential data
o
analysis.
o Processes temporal dependencies between video frames to detect
inconsistencies indicative of deepfakes.
3. Composite Dataset:
o Combines videos from FaceForensics++, Deepfake Detection
Challenge, and Celeb-DF datasets.
o Ensures a balanced dataset with 50% real and 50% deepfake videos for
training and testing.
4. Preprocessing Techniques:
o Video segmentation into frames.
o Face detection and cropping to focus on relevant regions.
o Frame selection (e.g., first 50, middle 50, and last 50 frames) to reduce
computational load.
Conclusion:
The paper presents a robust deepfake detection system that combines Res2Net
CNN for spatial feature extraction and LSTM for temporal analysis. The proposed
model achieves 90% accuracy in distinguishing between real and deepfake videos,
demonstrating its effectiveness in handling challenging cases like face-swapping and
subtle manipulations. However, limitations such as poor performance on low-
resolution videos and the need for real-time optimization highlight areas for future
improvement. The system has significant potential for integration into social media
platforms and other digital communication networks to curb the spread of deepfake
content. Future work should focus on enhancing cross-domain generalization,
incorporating audio-visual synchronization, and optimizing the model for real-time
deployment.
4. Rohin Raj Singh
Paper: Hand Detection using Recent Technologies
Objective:
Real-time hand gesture detection is a fundamental aspect of human-
computer interaction and augmented reality systems. The existing computer
vision and machine learning methods are plagued with slow response time
and accuracy.
Technologies Used:
YOLOv3 Algorithm:
Structure: Fully Convolutional Neural Network (CNN) of 106 layers.