首页 > 最新文献

Journal of Trends in Computer Science and Smart Technology最新文献

英文 中文
Skin Cancer Prediction using Enhanced Genetic Algorithm with Extreme Learning Machine 基于极限学习机的增强型遗传算法预测皮肤癌
Pub Date : 2023-02-27 DOI: 10.36548/jtcsst.2023.1.001
P. Ramya, B. Sathiyabhama
In the current scenario, the death rate due to the cause of skin cancer is increasing enormously. Diagnosis and prediction of Skin Cancer (SC) have become vital at an earlier stage. The main objective of this research is ensemble machine learning with enhanced genetic algorithm technique to achieve higher accuracy in the prediction of skin cancer at an earlier stage compared to other existing techniques. Although many machine learning and deep learning approaches implemented in detecting skin cancer at an earlier stage still there are few limitations. To overcome these problems in our proposed work, the CNN model, ResNet-16 usually produces successful results in extracting the features automatically and classifying the images very accurately. Therefore, the ResNet model used in our work obtains the deep features with the help of a fully connected layer. Later the feature selection is performed with the help of an Enhanced Genetic Algorithm (EGA) that produces optimized solutions by implementing operations like mutations, crossover, and ensemble with Extreme Learning Machine (EGA-ELM) to classify the images as either melanoma or non-melanoma. The proposed model certainly achieved higher accuracy and effective performance. Finally, the obtained results are to be compared with other popular classifying algorithms like Support Vector Machine (SVM) and various other models.
在目前的情况下,因皮肤癌引起的死亡率正在急剧上升。皮肤癌(SC)的早期诊断和预测变得至关重要。本研究的主要目标是集成机器学习与增强的遗传算法技术,与其他现有技术相比,在早期阶段实现更高的皮肤癌预测精度。尽管许多机器学习和深度学习方法被用于早期检测皮肤癌,但仍然存在一些局限性。在我们提出的工作中,为了克服这些问题,CNN模型ResNet-16通常在自动提取特征和非常准确地分类图像方面取得了成功的结果。因此,我们工作中使用的ResNet模型借助全连接层获得深度特征。然后,在增强型遗传算法(EGA)的帮助下进行特征选择,该算法通过与极限学习机(EGA- elm)实现突变、交叉和集成等操作来产生优化的解决方案,从而将图像分类为黑色素瘤或非黑色素瘤。该模型具有较高的精度和有效的性能。最后,将得到的结果与其他流行的分类算法,如支持向量机(SVM)和各种其他模型进行比较。
{"title":"Skin Cancer Prediction using Enhanced Genetic Algorithm with Extreme Learning Machine","authors":"P. Ramya, B. Sathiyabhama","doi":"10.36548/jtcsst.2023.1.001","DOIUrl":"https://doi.org/10.36548/jtcsst.2023.1.001","url":null,"abstract":"In the current scenario, the death rate due to the cause of skin cancer is increasing enormously. Diagnosis and prediction of Skin Cancer (SC) have become vital at an earlier stage. The main objective of this research is ensemble machine learning with enhanced genetic algorithm technique to achieve higher accuracy in the prediction of skin cancer at an earlier stage compared to other existing techniques. Although many machine learning and deep learning approaches implemented in detecting skin cancer at an earlier stage still there are few limitations. To overcome these problems in our proposed work, the CNN model, ResNet-16 usually produces successful results in extracting the features automatically and classifying the images very accurately. Therefore, the ResNet model used in our work obtains the deep features with the help of a fully connected layer. Later the feature selection is performed with the help of an Enhanced Genetic Algorithm (EGA) that produces optimized solutions by implementing operations like mutations, crossover, and ensemble with Extreme Learning Machine (EGA-ELM) to classify the images as either melanoma or non-melanoma. The proposed model certainly achieved higher accuracy and effective performance. Finally, the obtained results are to be compared with other popular classifying algorithms like Support Vector Machine (SVM) and various other models.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125710928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PAPR Reduction of OFDM with DFT Spreading Method 用DFT扩频法降低OFDM的PAPR
Pub Date : 2022-10-10 DOI: 10.36548/jtcsst.2022.3.008
Chandanala Sravanya, Pasupuleti Sairam, Barupatla Srinika
Future communication systems will demand the transmission of huge amounts of data, therefore will require a highly linear power amplifier. The Orthogonal Frequency Division Multiplexing (OFDM) technique is widely used in multimedia services for providing high data rates and providing high Quality of Service. The transmitter power amplifier's range of operation in a communication system is linear. Signal distortion happens when the input signal's amplitude exceeds the linear range of the transmitter power amplifier. Therefore, the transmitter's input signal has to have a low peak to average power ratio (PAPR). The OFDM system has been recognized as the high rate wireless radio channel transmission. Therefore, it will also be highly beneficial for the high-speed communication system. However, due to the extremely high PAPR issue, using the OFDM system in a communication system is not simple. It results in extremely low power efficiency. Therefore, it is crucial to lower the PAPR in the OFDM system in order to employ it in the communication system. By using a discrete Fourier matrix, the Discrete Fourier Transform spreading strategy may significantly lower the PAPR of an OFDM signal. This paper describes the PAPR reduction approach in OFDM signals and examines the effectiveness of OFDM.
未来的通信系统将需要传输大量的数据,因此需要一个高度线性的功率放大器。正交频分复用(OFDM)技术由于能够提供高数据速率和高质量的业务,在多媒体业务中得到了广泛的应用。在通信系统中,发射功率放大器的工作范围是线性的。当输入信号的幅度超过发射机功率放大器的线性范围时,就会发生信号失真。因此,发射机的输入信号必须具有较低的峰值平均功率比(PAPR)。OFDM系统是公认的高速无线信道传输方式。因此,它也将对高速通信系统大有裨益。然而,由于极高的PAPR问题,在通信系统中使用OFDM系统并不简单。它导致极低的功率效率。因此,降低OFDM系统的PAPR是将其应用于通信系统的关键。通过使用离散傅里叶矩阵,离散傅里叶变换扩频策略可以显著降低OFDM信号的PAPR。本文介绍了OFDM信号中PAPR的降低方法,并检验了OFDM的有效性。
{"title":"PAPR Reduction of OFDM with DFT Spreading Method","authors":"Chandanala Sravanya, Pasupuleti Sairam, Barupatla Srinika","doi":"10.36548/jtcsst.2022.3.008","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.008","url":null,"abstract":"Future communication systems will demand the transmission of huge amounts of data, therefore will require a highly linear power amplifier. The Orthogonal Frequency Division Multiplexing (OFDM) technique is widely used in multimedia services for providing high data rates and providing high Quality of Service. The transmitter power amplifier's range of operation in a communication system is linear. Signal distortion happens when the input signal's amplitude exceeds the linear range of the transmitter power amplifier. Therefore, the transmitter's input signal has to have a low peak to average power ratio (PAPR). The OFDM system has been recognized as the high rate wireless radio channel transmission. Therefore, it will also be highly beneficial for the high-speed communication system. However, due to the extremely high PAPR issue, using the OFDM system in a communication system is not simple. It results in extremely low power efficiency. Therefore, it is crucial to lower the PAPR in the OFDM system in order to employ it in the communication system. By using a discrete Fourier matrix, the Discrete Fourier Transform spreading strategy may significantly lower the PAPR of an OFDM signal. This paper describes the PAPR reduction approach in OFDM signals and examines the effectiveness of OFDM.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Technology in Education: An Educational Offshoot and a Monumental Add-on in Return 教育中的信息技术:一个教育分支和一个巨大的附加回报
Pub Date : 2022-09-27 DOI: 10.36548/jtcsst.2022.3.007
Rukia Rahman, Bilal Ahmad Dar
In the present world, ‘information technology has brought about a virtual revolution’ would be an absolute understatement. In fact, every field or sphere of life, considered generally, has been infused with a fresh life, via the channel of information technology. Moreover, the field of education is not any exception, to the good signs of information technology. The use of Information and Communication Technology (ICT) has the potential to significantly alter how teachers and students, teach and learn. ICT aids in increasing educational possibilities, enhancing the integrity of instruction and learning, prolonging lifelong learning, and enhancing managerial effectiveness and efficiency. In many ways, it can be said that the two are inseparable or work hand-in-glove. The present study aims to understand how Information and Technology are ruling the entire education system, as learning online as per the users’ flexibility is gaining popularity day by day and most importantly due to the implementation of new education system in India, many ICT based programs have been included in NEP-2020 like vocational courses, skill labs and coding programs. ICT also expands students’ and teachers’ educational opportunities and affordances, and this ultimately will also shape the future of the education system. This paper reviews various online learning platforms such as National Programme on Technology Enhanced Learning, which is the most subscribed educational channel, having more than 1.5 million subscribers.
在当今世界,“信息技术带来了一场虚拟革命”绝对是轻描淡写的说法。事实上,一般来说,通过信息技术的渠道,生活的每一个领域或领域都被注入了新的生命。此外,教育领域也不例外,对信息技术的好迹象。信息通信技术(ICT)的使用有可能显著改变教师和学生的教与学方式。信息通信技术有助于增加教育的可能性,加强教学和学习的完整性,延长终身学习,提高管理的有效性和效率。在许多方面,可以说这两者是不可分割的,或者是密切相关的。目前的研究旨在了解信息和技术是如何统治整个教育系统的,因为根据用户的灵活性在线学习日益受到欢迎,最重要的是,由于印度实施了新的教育系统,许多基于信息和通信技术的项目已被纳入NEP-2020,如职业课程、技能实验室和编码项目。信息通信技术还扩大了学生和教师的教育机会和负担,这最终也将塑造教育系统的未来。本文回顾了各种在线学习平台,如国家技术增强学习计划,这是订阅最多的教育频道,拥有超过150万的订阅者。
{"title":"Information Technology in Education: An Educational Offshoot and a Monumental Add-on in Return","authors":"Rukia Rahman, Bilal Ahmad Dar","doi":"10.36548/jtcsst.2022.3.007","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.007","url":null,"abstract":"In the present world, ‘information technology has brought about a virtual revolution’ would be an absolute understatement. In fact, every field or sphere of life, considered generally, has been infused with a fresh life, via the channel of information technology. Moreover, the field of education is not any exception, to the good signs of information technology. The use of Information and Communication Technology (ICT) has the potential to significantly alter how teachers and students, teach and learn. ICT aids in increasing educational possibilities, enhancing the integrity of instruction and learning, prolonging lifelong learning, and enhancing managerial effectiveness and efficiency. In many ways, it can be said that the two are inseparable or work hand-in-glove. The present study aims to understand how Information and Technology are ruling the entire education system, as learning online as per the users’ flexibility is gaining popularity day by day and most importantly due to the implementation of new education system in India, many ICT based programs have been included in NEP-2020 like vocational courses, skill labs and coding programs. ICT also expands students’ and teachers’ educational opportunities and affordances, and this ultimately will also shape the future of the education system. This paper reviews various online learning platforms such as National Programme on Technology Enhanced Learning, which is the most subscribed educational channel, having more than 1.5 million subscribers.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132537232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Insight into Deep Learning based Cryptojacking Detection Model 基于深度学习的加密劫持检测模型
Pub Date : 2022-09-21 DOI: 10.36548/jtcsst.2022.3.006
S. S. Sivaraju
To autonomously identify cyber threats is a non-trivial research topic. One area where this is most apparent is in the evolution of evasive cyber assaults, which are becoming better at masking their existence and obscuring their attack methods (for example, file-less malware). Particularly stealthy Advanced Persistent Threats may hide out in the system for a long time without being spotted. This study presents a novel method, dubbed CapJack, for identifying illicit bitcoin mining activity in a web browser by using cutting-edge CapsNet technology. Thus far, it is aware that deep learning framework CapsNet is pertained to the problem of detecting malware effectively using a heuristic based on system behaviour. Even more, in multitasking situations when several apps are all active at the same time, it is possible to identify fraudulent miners with greater efficiency.
自主识别网络威胁是一个不容忽视的研究课题。这一点最明显的一个领域是闪避式网络攻击的演变,这种攻击越来越善于掩盖自己的存在和模糊攻击方法(例如,无文件恶意软件)。特别隐秘的高级持续威胁可能在系统中隐藏很长时间而不被发现。这项研究提出了一种被称为CapJack的新方法,通过使用尖端的CapsNet技术来识别网络浏览器中的非法比特币挖矿活动。到目前为止,它意识到深度学习框架CapsNet涉及使用基于系统行为的启发式有效检测恶意软件的问题。更重要的是,在多个应用程序同时处于活动状态的多任务情况下,可以更有效地识别欺诈性矿工。
{"title":"An Insight into Deep Learning based Cryptojacking Detection Model","authors":"S. S. Sivaraju","doi":"10.36548/jtcsst.2022.3.006","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.006","url":null,"abstract":"To autonomously identify cyber threats is a non-trivial research topic. One area where this is most apparent is in the evolution of evasive cyber assaults, which are becoming better at masking their existence and obscuring their attack methods (for example, file-less malware). Particularly stealthy Advanced Persistent Threats may hide out in the system for a long time without being spotted. This study presents a novel method, dubbed CapJack, for identifying illicit bitcoin mining activity in a web browser by using cutting-edge CapsNet technology. Thus far, it is aware that deep learning framework CapsNet is pertained to the problem of detecting malware effectively using a heuristic based on system behaviour. Even more, in multitasking situations when several apps are all active at the same time, it is possible to identify fraudulent miners with greater efficiency.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Study on Sign Language Recognition for Deaf and Dumb people 聋哑人手语识别的综合研究
Pub Date : 2022-09-19 DOI: 10.36548/jtcsst.2022.3.005
G. K. Vaidhya, C. A. S. Deiva Preetha
There are roughly 72 million ‘hard of hearing’ individuals all over the planet, and more than 80% of them live in developing countries, as indicated in a review by the World Federation for the Deaf. Their lives are hindered by hearing distortions which bar them from showing full interest in the public besides taking pleasure in enjoying identical privileges. Motion based communication is common for the people with hearing and speaking impairments. Communication through signs is a successful choice rather than talking, where the former is replaced by hand flags. One solution to this problem is to study text comprehension tasks for hearing impaired localities using Sign Language Recognition. Gesture-based communication is the most significant and centered approach of communication for deaf and dumb individuals. This paper gives a concise review of different examination works conducted thus far in this field.
据世界聋人联合会(World Federation for the Deaf)的一份报告显示,全球大约有7200万“重听”人士,其中80%以上生活在发展中国家。他们的生活受到听力扭曲的阻碍,这使他们除了享受同样的特权外,无法对公众表现出充分的兴趣。对于有听力和语言障碍的人来说,基于动作的交流是很常见的。通过手势交流是一种成功的选择,而不是说话,后者被手旗取代。解决这一问题的一种方法是使用手语识别来研究听力受损地区的文本理解任务。手势交际是聋哑人最重要、最核心的交际方式。本文简要回顾了迄今为止在这一领域进行的不同的考试工作。
{"title":"A Comprehensive Study on Sign Language Recognition for Deaf and Dumb people","authors":"G. K. Vaidhya, C. A. S. Deiva Preetha","doi":"10.36548/jtcsst.2022.3.005","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.005","url":null,"abstract":"There are roughly 72 million ‘hard of hearing’ individuals all over the planet, and more than 80% of them live in developing countries, as indicated in a review by the World Federation for the Deaf. Their lives are hindered by hearing distortions which bar them from showing full interest in the public besides taking pleasure in enjoying identical privileges. Motion based communication is common for the people with hearing and speaking impairments. Communication through signs is a successful choice rather than talking, where the former is replaced by hand flags. One solution to this problem is to study text comprehension tasks for hearing impaired localities using Sign Language Recognition. Gesture-based communication is the most significant and centered approach of communication for deaf and dumb individuals. This paper gives a concise review of different examination works conducted thus far in this field.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path Planning of Mobile Robot Using Reinforcement Learning 基于强化学习的移动机器人路径规划
Pub Date : 2022-08-29 DOI: 10.36548/jtcsst.2022.3.004
K. G. Krishnan, Abhishek Mohan, S. Vishnu, Steve Abraham Eapen, Amith Raj, J. Jacob
In complex planning and control operations and tasks like manipulating objects, assisting experts in various fields, navigating outdoor environments, and exploring uncharted territory, modern robots are designed to complement or completely replace humans. Even for those skilled in robot programming, designing a control schema for such robots to carry out these tasks is typically a challenging process that necessitates starting from scratch with a new and distinct controller for each task. The designer must consider the wide range of circumstances the robot might encounter. This kind of manual programming is typically expensive and time consuming. It would be more beneficial if a robot could learn the task on its own rather than having to be preprogrammed to perform all these tasks. In this paper, a method for the path planning of a robot in a known environment is implemented using Q-Learning by finding an optimal path from a specified starting and ending point.
在复杂的规划和控制操作和任务中,如操纵物体,协助各个领域的专家,在室外环境中导航,探索未知领域,现代机器人旨在补充或完全取代人类。即使对于那些精通机器人编程的人来说,为这样的机器人设计一个执行这些任务的控制方案通常也是一个具有挑战性的过程,需要从头开始,为每个任务设计一个新的、独特的控制器。设计师必须考虑机器人可能遇到的各种各样的情况。这种手工编程通常是昂贵和耗时的。如果机器人能够自己学习任务,而不是被预先编程来执行所有这些任务,那将是更有益的。本文采用Q-Learning方法,从指定的起点和终点寻找最优路径,实现了机器人在已知环境中路径规划的方法。
{"title":"Path Planning of Mobile Robot Using Reinforcement Learning","authors":"K. G. Krishnan, Abhishek Mohan, S. Vishnu, Steve Abraham Eapen, Amith Raj, J. Jacob","doi":"10.36548/jtcsst.2022.3.004","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.004","url":null,"abstract":"In complex planning and control operations and tasks like manipulating objects, assisting experts in various fields, navigating outdoor environments, and exploring uncharted territory, modern robots are designed to complement or completely replace humans. Even for those skilled in robot programming, designing a control schema for such robots to carry out these tasks is typically a challenging process that necessitates starting from scratch with a new and distinct controller for each task. The designer must consider the wide range of circumstances the robot might encounter. This kind of manual programming is typically expensive and time consuming. It would be more beneficial if a robot could learn the task on its own rather than having to be preprogrammed to perform all these tasks. In this paper, a method for the path planning of a robot in a known environment is implemented using Q-Learning by finding an optimal path from a specified starting and ending point.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security 基于自引导元学习的人工智能在网络安全中的应用
Pub Date : 2022-08-20 DOI: 10.36548/jtcsst.2022.3.003
D. Sasikala, K. Venkatesh Sharma
Cybersecurity is an extensive and vivacious domain in the commercial progression of the ecosphere. By up-to-date inhabitants, networking settings and assets, cybersecurity fits with the exigent task to realize the necessities of the imminent populace. Intelligent cybersecurity / intellectual smart cybersecurity has risen as a pioneering tool to deal with latest ambiguities in programmed cybersecurity enduring capability by bringing together Artificial Intelligence (AI) in Cybersecurity Computerization. The mechanism that enterprises in this cutting-edge technology handles the mechanism capability to acquire via depleting Bootstrapped Meta-learning and reinforced with rewards as Supreme Cybersecurity vintages, besides least resource utilizations as well as time limits. AI empowered cybersecurity technology is a vital constituent of the imminent cybersecurity revolution ahead. During this operation, a proficient computerization of AI application in the arena of cybersecurity sustenance is ready for attaining the supreme output welfares as results, also inhibiting the real assets. Setting the precise real-time issues are trailed by cracking it for affluence and escalation or magnification of cybersecurity thus by prominent universal preeminent impending cybersecurity. A meta-learning/AI-based automated security strategy is vital in the protection of critical infrastructure, users and assets disinclined to outbreaks.
在生态圈的商业进程中,网络安全是一个广泛而活跃的领域。通过最新的居民,网络设置和资产,网络安全适合实现迫在眉睫的民众需求的紧迫任务。智能网络安全/智能智能网络安全已经崛起为一种开创性的工具,通过将人工智能(AI)整合到网络安全计算机化中,来处理程序化网络安全持久能力中的最新模糊性。采用这一尖端技术的企业,除了最低的资源利用率和时间限制外,还将通过耗尽自引导元学习获得的机制能力和奖励强化的机制能力作为最高网络安全的特征。人工智能支持的网络安全技术是即将到来的网络安全革命的重要组成部分。在此操作过程中,人工智能应用在网络安全保障领域的熟练计算机化已经准备好获得最大的产出福利,同时也抑制了实物资产。设置精确的实时问题,通过破解它来丰富和升级或放大网络安全,从而通过突出的普遍卓越的迫在眉睫的网络安全。基于元学习/人工智能的自动化安全策略对于保护不容易爆发的关键基础设施、用户和资产至关重要。
{"title":"Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security","authors":"D. Sasikala, K. Venkatesh Sharma","doi":"10.36548/jtcsst.2022.3.003","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.003","url":null,"abstract":"Cybersecurity is an extensive and vivacious domain in the commercial progression of the ecosphere. By up-to-date inhabitants, networking settings and assets, cybersecurity fits with the exigent task to realize the necessities of the imminent populace. Intelligent cybersecurity / intellectual smart cybersecurity has risen as a pioneering tool to deal with latest ambiguities in programmed cybersecurity enduring capability by bringing together Artificial Intelligence (AI) in Cybersecurity Computerization. The mechanism that enterprises in this cutting-edge technology handles the mechanism capability to acquire via depleting Bootstrapped Meta-learning and reinforced with rewards as Supreme Cybersecurity vintages, besides least resource utilizations as well as time limits. \u0000AI empowered cybersecurity technology is a vital constituent of the imminent cybersecurity revolution ahead. During this operation, a proficient computerization of AI application in the arena of cybersecurity sustenance is ready for attaining the supreme output welfares as results, also inhibiting the real assets. Setting the precise real-time issues are trailed by cracking it for affluence and escalation or magnification of cybersecurity thus by prominent universal preeminent impending cybersecurity. A meta-learning/AI-based automated security strategy is vital in the protection of critical infrastructure, users and assets disinclined to outbreaks.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117200946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IIoT-IDS Network using Inception CNN Model 基于Inception CNN模型的IIoT-IDS网络
Pub Date : 2022-08-18 DOI: 10.36548/jtcsst.2022.3.002
A. Arun kumar, Radha Krishna Karne
Modern network and Industrial Internet of Things (IIoT) technologies are quite advanced. Networks experience data breaches annually. As a result, an Intrusion Detection System is designed for enhancing the IIoT security protection under privacy laws. The Internet of Things' structural system and security performance criteria must meet high standards in an adversarial network. The network system must use a system that is very stable and has a low rate of data loss. The basic deep learning network technology is picked after analysing it with a huge number of other network configurations. Further, the network is upgraded and optimised by the Convolutional Neural Network technique. Additionally, an IIoT anti-intrusion detection system is built by combining three network technologies. The system's performance is evaluated and confirmed. The proposed model gives a better detection rate with a minimum false positive rate, and good data correctness. As a result, the proposed method can be used for securing an IIoT data privacy under the law.
现代网络和工业物联网(IIoT)技术相当先进。网络每年都会遭遇数据泄露。因此,入侵检测系统旨在加强隐私法下的工业物联网安全保护。物联网的结构体系和安全性能标准在对抗网络中必须达到高标准。网络系统必须使用非常稳定、数据丢失率低的系统。基本的深度学习网络技术是在与大量其他网络配置进行分析后选择的。此外,利用卷积神经网络技术对网络进行了升级和优化。结合三种网络技术,构建了工业物联网防入侵检测系统。对系统的性能进行了评估和确认。该模型具有较高的检测率和最小的误报率,并且具有良好的数据正确性。因此,根据法律规定,该方法可用于保护工业物联网数据隐私。
{"title":"IIoT-IDS Network using Inception CNN Model","authors":"A. Arun kumar, Radha Krishna Karne","doi":"10.36548/jtcsst.2022.3.002","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.002","url":null,"abstract":"Modern network and Industrial Internet of Things (IIoT) technologies are quite advanced. Networks experience data breaches annually. As a result, an Intrusion Detection System is designed for enhancing the IIoT security protection under privacy laws. The Internet of Things' structural system and security performance criteria must meet high standards in an adversarial network. The network system must use a system that is very stable and has a low rate of data loss. The basic deep learning network technology is picked after analysing it with a huge number of other network configurations. Further, the network is upgraded and optimised by the Convolutional Neural Network technique. Additionally, an IIoT anti-intrusion detection system is built by combining three network technologies. The system's performance is evaluated and confirmed. The proposed model gives a better detection rate with a minimum false positive rate, and good data correctness. As a result, the proposed method can be used for securing an IIoT data privacy under the law.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest 决策树与随机森林对学生成绩预测的比较分析
Pub Date : 2022-08-01 DOI: 10.36548/jtcsst.2022.3.001
Narayan Prasad Dahal, S. Shakya
Many types of research are based on students' past data for predicting their performance. A lot of data mining techniques for analyzing the data have been used so far. This research project predicts the higher secondary students' results based on their academic background, family details, and previous examination results using three decision tree algorithms: ID3, C4.5 (J48), and CART (Classification and Regression Tree) with other classification algorithms: Random Forest (RF), K-nearest Neighbors (KNN), Support Vector Machine (SVM) and Artificial Neural Network (ANN). The research project analyzes the performance and accuracy based on the results obtained. It also identifies some common differences based on achieved output and previous research work.
许多类型的研究都是基于学生过去的数据来预测他们的表现。到目前为止,已经使用了许多用于分析数据的数据挖掘技术。本研究利用ID3、C4.5 (J48)和CART (Classification and Regression tree)三种决策树算法,结合随机森林(RF)、k近邻(KNN)、支持向量机(SVM)和人工神经网络(ANN)四种分类算法,根据学生的学习背景、家庭背景和以前的考试成绩预测高中生的成绩。研究项目根据所得结果对其性能和精度进行了分析。它还根据已取得的成果和以前的研究工作确定了一些共同的差异。
{"title":"A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest","authors":"Narayan Prasad Dahal, S. Shakya","doi":"10.36548/jtcsst.2022.3.001","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.3.001","url":null,"abstract":"Many types of research are based on students' past data for predicting their performance. A lot of data mining techniques for analyzing the data have been used so far. This research project predicts the higher secondary students' results based on their academic background, family details, and previous examination results using three decision tree algorithms: ID3, C4.5 (J48), and CART (Classification and Regression Tree) with other classification algorithms: Random Forest (RF), K-nearest Neighbors (KNN), Support Vector Machine (SVM) and Artificial Neural Network (ANN). The research project analyzes the performance and accuracy based on the results obtained. It also identifies some common differences based on achieved output and previous research work.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"88 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116277859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey Paper on Fruit Recognition, Classification and Quality Health Maintenance 水果识别、分类与品质保健研究综述
Pub Date : 2022-07-22 DOI: 10.36548/jtcsst.2022.2.006
Sanketa Kulkarni, V. S. Krushnasamy
This research focuses on fruit and vegetables classification, recognition based on its health and quality by using Raspberry pi board, which is further integrated with digital image processing techniques and machine learning concepts. Convolutional Neural Networks (CNN) is generally used to perform image identification and categorization in the object recognition systems. The recent advancements in deep learning-based models assist in performing complex image recognition. This study also proposes an effective CNN-based method for performing fruit recognition, fruit maturity based categorization, and calorie estimation. Datasets are used to train the proposed machine learning model. The dataset used here is a combination of image data containing various types of fruit; here the proposed cost-effective yet powerful fruit quality maintenance method will be useful for fruit vendors and farmers.
本研究以树莓派板为基础,结合数字图像处理技术和机器学习概念,对果蔬进行健康和品质分类识别。在物体识别系统中,通常使用卷积神经网络(CNN)来进行图像识别和分类。基于深度学习的模型的最新进展有助于执行复杂的图像识别。本研究还提出了一种有效的基于cnn的水果识别、水果成熟度分类和卡路里估计方法。数据集用于训练提出的机器学习模型。这里使用的数据集是包含各种水果的图像数据的组合;在这里,提出的具有成本效益且功能强大的水果品质维护方法将对水果摊贩和农民有用。
{"title":"Survey Paper on Fruit Recognition, Classification and Quality Health Maintenance","authors":"Sanketa Kulkarni, V. S. Krushnasamy","doi":"10.36548/jtcsst.2022.2.006","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.006","url":null,"abstract":"This research focuses on fruit and vegetables classification, recognition based on its health and quality by using Raspberry pi board, which is further integrated with digital image processing techniques and machine learning concepts. Convolutional Neural Networks (CNN) is generally used to perform image identification and categorization in the object recognition systems. The recent advancements in deep learning-based models assist in performing complex image recognition. This study also proposes an effective CNN-based method for performing fruit recognition, fruit maturity based categorization, and calorie estimation. Datasets are used to train the proposed machine learning model. The dataset used here is a combination of image data containing various types of fruit; here the proposed cost-effective yet powerful fruit quality maintenance method will be useful for fruit vendors and farmers.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Trends in Computer Science and Smart Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1