首页 > 最新文献

2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
Time Series with Sentiment Analysis for Stock Price Prediction 基于情绪分析的时间序列股票价格预测
Vrishabh Sharma, R. Khemnar, R. Kumari, B. Mohan
Stock price prediction has been a major area of research for many years. Accurate predictions can help investors take correct decisions about the selling/purchase of stocks. This paper aims to predict and gauge stock costs and patterns, utilizing the power of machine learning, content examination and fundamental analysis, to give traders a hands-on tool for keen speculations particularly for the volatile Indian Stock Market. We propose a technique to analyze and predict the stock price with the help of sentiment analysis and decomposable time series model along with multivariate-linear regression.
股票价格预测多年来一直是一个重要的研究领域。准确的预测可以帮助投资者在买卖股票时做出正确的决定。本文旨在预测和衡量股票成本和模式,利用机器学习,内容检查和基本分析的力量,为交易者提供敏锐投机的动手工具,特别是对波动的印度股市。本文提出了一种基于情绪分析和可分解时间序列模型以及多元线性回归的股票价格分析与预测技术。
{"title":"Time Series with Sentiment Analysis for Stock Price Prediction","authors":"Vrishabh Sharma, R. Khemnar, R. Kumari, B. Mohan","doi":"10.1109/ICCT46177.2019.8969060","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969060","url":null,"abstract":"Stock price prediction has been a major area of research for many years. Accurate predictions can help investors take correct decisions about the selling/purchase of stocks. This paper aims to predict and gauge stock costs and patterns, utilizing the power of machine learning, content examination and fundamental analysis, to give traders a hands-on tool for keen speculations particularly for the volatile Indian Stock Market. We propose a technique to analyze and predict the stock price with the help of sentiment analysis and decomposable time series model along with multivariate-linear regression.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implementation of Three Dimensional Model for Flying Ad Hoc Network 飞行Ad Hoc网络三维模型的实现
Sunil Kr. Maakar, Y. Singh, Rajeshwar Singh
Flying Ad Hoc Network (FANET) is a unique class of MANET that provides the communication between tiny flying drones called micro UAVs (unmanned aerial vehicle) facilitate with a camera, sensor, and communication system. FANET has a wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its extraordinary features have some challenges and issues that should be considered. Implementation of three-dimensional models of FANETs is one such issue. Numbers of researchers have joined their hands in the field of FANET. Till now, experts try to implement two-dimensional FANET model only. So observance in this mind, we have a consideration about the implantation of three-dimensional models for FANET in this paper, by utilizing the Gauss Markov Mobility Model with AODV as routing protocol. Simulation experiment has been carried out using NS3.
飞行自组织网络(FANET)是一种独特的MANET,它提供了微型飞行无人机之间的通信,称为微型无人机(无人驾驶飞行器),便于相机,传感器和通信系统。FANET具有广泛的应用领域,如军事和民用目的的侦察和监视。fanet及其非凡的功能有一些应该考虑的挑战和问题。fanet三维模型的实现就是这样一个问题。许多研究人员已经在FANET领域联合起来。到目前为止,专家们只尝试实现二维FANET模型。因此,考虑到这一点,我们在本文中考虑了通过使用AODV作为路由协议的高斯马尔可夫迁移模型来植入FANET的三维模型。采用NS3进行了仿真实验。
{"title":"Implementation of Three Dimensional Model for Flying Ad Hoc Network","authors":"Sunil Kr. Maakar, Y. Singh, Rajeshwar Singh","doi":"10.1109/ICCT46177.2019.8969063","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969063","url":null,"abstract":"Flying Ad Hoc Network (FANET) is a unique class of MANET that provides the communication between tiny flying drones called micro UAVs (unmanned aerial vehicle) facilitate with a camera, sensor, and communication system. FANET has a wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its extraordinary features have some challenges and issues that should be considered. Implementation of three-dimensional models of FANETs is one such issue. Numbers of researchers have joined their hands in the field of FANET. Till now, experts try to implement two-dimensional FANET model only. So observance in this mind, we have a consideration about the implantation of three-dimensional models for FANET in this paper, by utilizing the Gauss Markov Mobility Model with AODV as routing protocol. Simulation experiment has been carried out using NS3.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rumor Propagation: A State-of-the-art Survey of Current Challenges and Opportunities 谣言传播:当前挑战与机遇的最新研究
Roohani, Tushar Rana, P. Meel
Rumor propagation is an alarming problem that creates a lot of predicament and has significant impact on people’s lives. Earlier rumor could only be spread by the word of the mouth however in the current Web age, people are using electronics much more than they used to before, thereby resulting into lot of social interaction on the Web and hence spread of fake news is at its apex. This survey paper is written while keeping in mind the problem of fake news propagation and various approaches given to limit the spread up to a considerable extent. Fake news propagation is a new field of research and constant work is going on this field. Various models already given attempt to recognize the pattern of the news spread, correlates the rumor propagation with nature inspired phenomena. In this review paper, we also give the comparison between these models and their variants, this study leads us to see which areas are still challenging and what are the future prospects of rumor propagation.
谣言传播是一个令人担忧的问题,它造成了许多困境,对人们的生活产生了重大影响。早期的谣言只能通过口口相传来传播,然而在当前的网络时代,人们比以前更多地使用电子产品,从而导致了网络上的大量社交互动,因此假新闻的传播达到了顶峰。这篇调查论文是在写的同时记住假新闻传播的问题和各种方法,以限制传播到相当大的程度。假新闻传播是一个新的研究领域,在这一领域的研究工作还在不断进行。各种模型都试图识别新闻传播的模式,将谣言传播与自然现象联系起来。在这篇综述文章中,我们也给出了这些模型和它们的变体之间的比较,这项研究让我们看到哪些领域仍然具有挑战性,以及谣言传播的未来前景是什么。
{"title":"Rumor Propagation: A State-of-the-art Survey of Current Challenges and Opportunities","authors":"Roohani, Tushar Rana, P. Meel","doi":"10.1109/ICCT46177.2019.8969023","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969023","url":null,"abstract":"Rumor propagation is an alarming problem that creates a lot of predicament and has significant impact on people’s lives. Earlier rumor could only be spread by the word of the mouth however in the current Web age, people are using electronics much more than they used to before, thereby resulting into lot of social interaction on the Web and hence spread of fake news is at its apex. This survey paper is written while keeping in mind the problem of fake news propagation and various approaches given to limit the spread up to a considerable extent. Fake news propagation is a new field of research and constant work is going on this field. Various models already given attempt to recognize the pattern of the news spread, correlates the rumor propagation with nature inspired phenomena. In this review paper, we also give the comparison between these models and their variants, this study leads us to see which areas are still challenging and what are the future prospects of rumor propagation.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Pragmatic Evaluation of 4G and 5G Wireless Networks in the Current Scenario 当前场景下4G和5G无线网络的实用评估
Er. Kailash Aseri
In the current scenario, most of the services are deployed on web based services and these can be accessed using wireless technologies. The greater part of the corporate or business driven organizations is conveyed on web or cloud based condition. For such usage, the sites, versatile applications and cloud put together administrations are propelled with respect to the internet so that the whenever anyplace access to the administrations can be accessible. India is one of the greatest markets of cell phones and a worthwhile spot for the global organizations associated with the assembling of cell phones. From the examination investigation and reports from Statista.com, it is introduced that India is one of the key nations with tremendous market of versatile clients. In year 2017, around 134 millions cell phones were sold in India that is the enormous figure. From another exploration report, it is anticipated that the cell phone clients in India will increment to around 450 Millions by year 2022. To adapt up to the huge heap of cell phone remote systems, there is have to hoist the execution in current 4G and emerging 5G Networks advancements with the goal that the higher level of execution can be accomplished in the system condition. This original copy is having the emphasis on the delineation of the result from cutting edge remote systems of 4G and 5G with the reproduction utilizing the development execution apparatuses of cupcarbon.
在当前的场景中,大多数服务都部署在基于web的服务上,并且可以使用无线技术访问这些服务。公司或业务驱动的组织的大部分是在基于web或云的条件下传递的。对于这样的使用,网站、多功能应用程序和云组合管理被推动到互联网上,以便随时随地访问管理都可以访问。印度是最大的手机市场之一,对于与手机组装有关的全球组织来说,这是一个值得一看的地方。从Statista.com的考察调查和报告中可以看出,印度是拥有巨大多功能客户市场的关键国家之一。2017年,印度销售了大约1.34亿部手机,这是一个巨大的数字。根据另一份勘探报告,预计到2022年,印度的手机用户将增加到4.5亿左右。为了适应庞大的手机远程系统,必须提升当前4G和新兴5G网络的执行力,目标是在系统条件下完成更高水平的执行。这篇原创文章的重点是描述4G和5G尖端远程系统的结果,并利用cupcarbon的开发执行设备进行复制。
{"title":"A Pragmatic Evaluation of 4G and 5G Wireless Networks in the Current Scenario","authors":"Er. Kailash Aseri","doi":"10.1109/ICCT46177.2019.8968780","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968780","url":null,"abstract":"In the current scenario, most of the services are deployed on web based services and these can be accessed using wireless technologies. The greater part of the corporate or business driven organizations is conveyed on web or cloud based condition. For such usage, the sites, versatile applications and cloud put together administrations are propelled with respect to the internet so that the whenever anyplace access to the administrations can be accessible. India is one of the greatest markets of cell phones and a worthwhile spot for the global organizations associated with the assembling of cell phones. From the examination investigation and reports from Statista.com, it is introduced that India is one of the key nations with tremendous market of versatile clients. In year 2017, around 134 millions cell phones were sold in India that is the enormous figure. From another exploration report, it is anticipated that the cell phone clients in India will increment to around 450 Millions by year 2022. To adapt up to the huge heap of cell phone remote systems, there is have to hoist the execution in current 4G and emerging 5G Networks advancements with the goal that the higher level of execution can be accomplished in the system condition. This original copy is having the emphasis on the delineation of the result from cutting edge remote systems of 4G and 5G with the reproduction utilizing the development execution apparatuses of cupcarbon.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134574033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power Allocation Schemes for Implant Nodes in Cooperative Wireless Body Area Networks 无线协作体域网络中植入节点功率分配方案
G. Kumar, U. Prashanthi, K. Tejaswini, T. Gayathri
In this paper, a body area network (BAN) consisting of source and destination with multiple amplify and forward nodes called relays in between them are considered and the power allocation to the relays is investigated. This investigation has been done for Implant nodes considering two scenarios. In the first scenario, the objective is to maximize the effective signal to noise ratio (SNR) of the source-relay and the relay-destination links under the total relay power constraint. In the second scenario, the objective is to maximize the total power allocated for a given data rate. These objectives are aimed to show their results by means of error rate. Finally the results are correlated with respect to direct transmission and then concluded.
本文考虑了一种由源和目的组成的体域网络,在它们之间有多个放大和转发节点,称为中继,并对中继的功率分配进行了研究。本研究是针对两种情况的植入淋巴结进行的。在第一种场景中,目标是在中继总功率约束下最大化源-中继和中继-目的链路的有效信噪比(SNR)。在第二个场景中,目标是最大化为给定数据速率分配的总功率。这些目标旨在通过错误率来显示其结果。最后将结果与直接传播进行关联,得出结论。
{"title":"Power Allocation Schemes for Implant Nodes in Cooperative Wireless Body Area Networks","authors":"G. Kumar, U. Prashanthi, K. Tejaswini, T. Gayathri","doi":"10.1109/ICCT46177.2019.8968787","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968787","url":null,"abstract":"In this paper, a body area network (BAN) consisting of source and destination with multiple amplify and forward nodes called relays in between them are considered and the power allocation to the relays is investigated. This investigation has been done for Implant nodes considering two scenarios. In the first scenario, the objective is to maximize the effective signal to noise ratio (SNR) of the source-relay and the relay-destination links under the total relay power constraint. In the second scenario, the objective is to maximize the total power allocated for a given data rate. These objectives are aimed to show their results by means of error rate. Finally the results are correlated with respect to direct transmission and then concluded.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Comparative Analysis of Methods for Enhancer Prediction in Genomic Data 基于机器学习的基因组数据增强子预测方法比较分析
Amandeep Kaur, A. Chauhan, A. Aggarwal
The duel for discovery of enhancer along with the beginning of next generation sequencing is a consequence of discovery simian virus 40 (SV40) that is believed to be first enhancers noticed in wide set of genomic data. Features for predicting enhancers such as marks for histone modification, elements mined from sequences characteristics, epigenetic marks right away from primary tissues are implemented with a capricious success rate. Though till date there is no distinct enhancer indicator fetching an agreement in discriminating and exposing enhancer from massive genomic data sets. Machine learning has arisen out to be one of the competent computational approaches with a diversity of supervised, unsupervised and hybrid architectures used for enhancer identification. In this paper, attention is given to the tools lately developed for enhancer prediction working on common feature of enhancer. Comparative analysis of methods for enhancer prediction and corresponding results are prepared amid functionally analogous counterparts.
随着下一代测序的开始,发现增强子的竞争是发现猿猴病毒40 (SV40)的结果,SV40被认为是广泛基因组数据中第一个注意到的增强子。预测增强子的特征,如组蛋白修饰标记、从序列特征中提取的元素、直接来自原代组织的表观遗传标记等,都以反复无常的成功率实现。尽管迄今为止还没有明确的增强子指标,但在从大量基因组数据集中区分和暴露增强子方面取得了一致意见。机器学习已经成为一种有效的计算方法,具有多种监督、无监督和混合架构,用于增强器识别。本文重点介绍了近年来发展起来的基于增强子共同特征的增强子预测工具。在功能相似的模型中,对增强子预测方法和结果进行了比较分析。
{"title":"Machine Learning Based Comparative Analysis of Methods for Enhancer Prediction in Genomic Data","authors":"Amandeep Kaur, A. Chauhan, A. Aggarwal","doi":"10.1109/ICCT46177.2019.8969054","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969054","url":null,"abstract":"The duel for discovery of enhancer along with the beginning of next generation sequencing is a consequence of discovery simian virus 40 (SV40) that is believed to be first enhancers noticed in wide set of genomic data. Features for predicting enhancers such as marks for histone modification, elements mined from sequences characteristics, epigenetic marks right away from primary tissues are implemented with a capricious success rate. Though till date there is no distinct enhancer indicator fetching an agreement in discriminating and exposing enhancer from massive genomic data sets. Machine learning has arisen out to be one of the competent computational approaches with a diversity of supervised, unsupervised and hybrid architectures used for enhancer identification. In this paper, attention is given to the tools lately developed for enhancer prediction working on common feature of enhancer. Comparative analysis of methods for enhancer prediction and corresponding results are prepared amid functionally analogous counterparts.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the Security Problems of Robotic Systems 机器人系统安全问题分析
A. Basan, E. Basan, Anton Gritsynin
The purpose of this work is to analyze the security problems of robotic systems and analyze the approaches to assessing the security of a wireless robotic system. The solution to this problem involves the use of developed frameworks. Prefixed frameworks assume that the robotic system is divided into levels and after that it is necessary to directly protect each level. Each level has its own features and drawbacks that must be taken into account when developing a security system for a robotic system.
本工作的目的是分析机器人系统的安全问题,并分析评估无线机器人系统安全性的方法。这个问题的解决方案涉及到使用已开发的框架。前缀框架假定机器人系统被划分为若干层,然后有必要直接保护每一层。每个级别都有自己的特点和缺点,在为机器人系统开发安全系统时必须考虑到这些特点和缺点。
{"title":"Analysis of the Security Problems of Robotic Systems","authors":"A. Basan, E. Basan, Anton Gritsynin","doi":"10.1109/ICCT46177.2019.8969055","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969055","url":null,"abstract":"The purpose of this work is to analyze the security problems of robotic systems and analyze the approaches to assessing the security of a wireless robotic system. The solution to this problem involves the use of developed frameworks. Prefixed frameworks assume that the robotic system is divided into levels and after that it is necessary to directly protect each level. Each level has its own features and drawbacks that must be taken into account when developing a security system for a robotic system.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132155002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Natural Language Processing and IoTCloud in Smart Homes 自然语言处理和物联网云在智能家居中的应用
Shubham Kumar, S. Benedict, Srilakshmi Ajith
Internet of Things (IoT) based systems, most predominantly, the machine to machine communication based systems, have evolved in the recent past which helped to increase the efficiency of services offered without much necessity of human interaction. In general, IoT cloud-assisted solutions could serve several applications, including the Smart Home Automation, due to the availability of high-speed mobile networks coupled with cost effective, accessible and fast embedded hardware. In fact, there exists a few smart home solutions in the market that aim at automating the basic operations of home appliances. However, most of these systems focus on mimicking the basic operations of the electrical switches. This paper attempts to unfold a Smart Home Automation system using Natural Language Processing (NLP) and IoT cloud solutions. The proposed system was able to remotely control smart homes in a secure and in a customized manner; the approach could precisely monitor home devices with the application of GoogleAPI for integrating devices. Experiments were carried out at the IoT Cloud research lab of IIIT Kottayam such that a mini-Smart Home environment was setup to remotely control the sensors such as humidity and temperatures of Smart Homes. The paper described a method to create an end user product using 3D modeling and 3D printing facilities. In addition, the paper has unfolded the state-of-the-art research works carried out in the field of smart home automation using NLPs.
基于物联网(IoT)的系统,最主要的是基于机器对机器通信的系统,在最近的过去已经发展起来,这有助于提高所提供服务的效率,而不需要太多的人工交互。一般来说,物联网云辅助解决方案可以服务于多种应用,包括智能家居自动化,因为高速移动网络的可用性加上成本效益高、可访问和快速的嵌入式硬件。事实上,市场上存在一些智能家居解决方案,旨在使家电的基本操作自动化。然而,这些系统大多侧重于模拟电气开关的基本操作。本文试图展示一个使用自然语言处理(NLP)和物联网云解决方案的智能家居自动化系统。所提出的系统能够以安全和定制的方式远程控制智能家居;该方法可以通过应用GoogleAPI集成设备,实现对家庭设备的精确监控。在印度理工学院Kottayam物联网云研究实验室进行了实验,建立了一个微型智能家居环境,远程控制智能家居的湿度和温度等传感器。本文描述了一种使用3D建模和3D打印设备创建最终用户产品的方法。此外,本文还展示了使用nlp在智能家居自动化领域开展的最新研究工作。
{"title":"Application of Natural Language Processing and IoTCloud in Smart Homes","authors":"Shubham Kumar, S. Benedict, Srilakshmi Ajith","doi":"10.1109/ICCT46177.2019.8969066","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969066","url":null,"abstract":"Internet of Things (IoT) based systems, most predominantly, the machine to machine communication based systems, have evolved in the recent past which helped to increase the efficiency of services offered without much necessity of human interaction. In general, IoT cloud-assisted solutions could serve several applications, including the Smart Home Automation, due to the availability of high-speed mobile networks coupled with cost effective, accessible and fast embedded hardware. In fact, there exists a few smart home solutions in the market that aim at automating the basic operations of home appliances. However, most of these systems focus on mimicking the basic operations of the electrical switches. This paper attempts to unfold a Smart Home Automation system using Natural Language Processing (NLP) and IoT cloud solutions. The proposed system was able to remotely control smart homes in a secure and in a customized manner; the approach could precisely monitor home devices with the application of GoogleAPI for integrating devices. Experiments were carried out at the IoT Cloud research lab of IIIT Kottayam such that a mini-Smart Home environment was setup to remotely control the sensors such as humidity and temperatures of Smart Homes. The paper described a method to create an end user product using 3D modeling and 3D printing facilities. In addition, the paper has unfolded the state-of-the-art research works carried out in the field of smart home automation using NLPs.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel method for IDC Prediction in Breast Cancer Histopathology images using Deep Residual Neural Networks 基于深度残差神经网络的乳腺癌组织病理学图像IDC预测新方法
Chandra Churh Chatterjee, G. Krishna
Invasive ductal carcinoma (IDC), which is also sometimes known as the infiltrating ductal carcinoma, is the most regular form of breast cancer. It accounts to about 80% of all breast cancers. According to American Cancer Society [1], more than 180, 000 women in the United States are diagnosed with invasive breast cancer each year. The survival rate associated with this form of cancer is about 77% to 93% depending on the stage at which they are being diagnosed. The invasiveness and the frequency of the occurrence of these disease makes it one of the difficult cancers to be diagnosed. Our proposed methodology involves diagnosing the invasive ductal carcinoma with a deep residual convolution network to classify the IDC affected histopathological images from the normal images. The dataset for the purpose used is a benchmark dataset known as the Breast Histopathology Images [2]. The microscopic RGB images are converted into a seven channel image matrix, which are then fed to the network. The proposed model produces a 99.29% accurate approach towards prediction of IDC in the histopathology images with an AUROC score of 0.9996. Classification ability of the model is tested using standard performance metrics. The following methodology has been described in the next sections. Index Terms–Residual learning, CIELAB color space, Grad-CAM, Contrast adaptive histogram equalization (CLAHE), Gaussian filtering
浸润性导管癌(IDC),有时也被称为浸润性导管癌,是最常见的乳腺癌形式。它约占所有乳腺癌的80%。根据美国癌症协会的数据,美国每年有超过18万名女性被诊断为浸润性乳腺癌。这种癌症的存活率约为77%至93%,这取决于它们被诊断的阶段。这些疾病的侵袭性和发生频率使其成为难以诊断的癌症之一。我们提出的方法包括使用深度残差卷积网络将IDC影响的组织病理图像与正常图像进行分类来诊断浸润性导管癌。用于此目的的数据集是一个称为乳腺组织病理学图像[2]的基准数据集。显微RGB图像被转换成一个七通道图像矩阵,然后被馈送到网络中。该模型对组织病理学图像的IDC预测准确率为99.29%,AUROC评分为0.9996。使用标准性能指标测试模型的分类能力。下面的部分将描述下面的方法。索引术语:残差学习,CIELAB色彩空间,gradcam,对比度自适应直方图均衡(CLAHE),高斯滤波
{"title":"A Novel method for IDC Prediction in Breast Cancer Histopathology images using Deep Residual Neural Networks","authors":"Chandra Churh Chatterjee, G. Krishna","doi":"10.1109/ICCT46177.2019.8969037","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969037","url":null,"abstract":"Invasive ductal carcinoma (IDC), which is also sometimes known as the infiltrating ductal carcinoma, is the most regular form of breast cancer. It accounts to about 80% of all breast cancers. According to American Cancer Society [1], more than 180, 000 women in the United States are diagnosed with invasive breast cancer each year. The survival rate associated with this form of cancer is about 77% to 93% depending on the stage at which they are being diagnosed. The invasiveness and the frequency of the occurrence of these disease makes it one of the difficult cancers to be diagnosed. Our proposed methodology involves diagnosing the invasive ductal carcinoma with a deep residual convolution network to classify the IDC affected histopathological images from the normal images. The dataset for the purpose used is a benchmark dataset known as the Breast Histopathology Images [2]. The microscopic RGB images are converted into a seven channel image matrix, which are then fed to the network. The proposed model produces a 99.29% accurate approach towards prediction of IDC in the histopathology images with an AUROC score of 0.9996. Classification ability of the model is tested using standard performance metrics. The following methodology has been described in the next sections. Index Terms–Residual learning, CIELAB color space, Grad-CAM, Contrast adaptive histogram equalization (CLAHE), Gaussian filtering","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Forecasting the Trends and Patterns of Crime in Bangladesh using Machine Learning Model 使用机器学习模型预测孟加拉国犯罪的趋势和模式
A. Biswas, Sarnali Basak
Last few years in Bangladesh, the crime rate has increased rapidly. Hence it is an essential task to analyze and predict the crime so that the authority can minimize or prevent the crimes easily. In this situation, machine learning can perform a notable role to reveal the crime trends and patterns of Bangladesh. Here, various machine learning regression models i.e. linear regression, polynomial regression, and random forest regression are used to forecast the trends and patterns of crime in Bangladesh. Dataset used in this research is available for the public which is gathered from the Bangladesh police’s website. The dataset comprises record about various crime types i.e. dacoity, robbery, kidnapping, murder, women & child repression, theft, burglary, arms act, explosive, narcotics, and smuggling of Bangladesh. Firstly, training of regression models is done on the training dataset. After completion of the training, forecasting of crime is performed on the test data by the different regression models. Then we compare the forecasting results with the actual results and calculate the model evaluation metrics for the different applied regression models. After comparing the result, it is possible to find out the best-suited regression model for the crime-related data among all the applied regression models. Finally, it is observed that polynomial and random forest regression are better to predict the crime trends and patterns than the linear regression.
过去几年在孟加拉国,犯罪率迅速上升。因此,对犯罪进行分析和预测是一项必不可少的任务,以便当局能够轻松地减少或预防犯罪。在这种情况下,机器学习可以发挥显着作用,揭示孟加拉国的犯罪趋势和模式。在这里,各种机器学习回归模型,即线性回归,多项式回归和随机森林回归被用来预测孟加拉国的犯罪趋势和模式。本研究中使用的数据集是从孟加拉国警方网站收集的,可供公众使用。该数据集包括各种犯罪类型的记录,即抢劫,抢劫,绑架,谋杀,妇女和儿童镇压,盗窃,入室盗窃,武器行为,爆炸,毒品和孟加拉国的走私。首先,在训练数据集上对回归模型进行训练。训练完成后,通过不同的回归模型对测试数据进行犯罪预测。然后将预测结果与实际结果进行比较,并计算不同应用回归模型的模型评价指标。比较结果后,可以在所有应用的回归模型中找出最适合犯罪相关数据的回归模型。最后,我们观察到多项式回归和随机森林回归比线性回归更能预测犯罪趋势和模式。
{"title":"Forecasting the Trends and Patterns of Crime in Bangladesh using Machine Learning Model","authors":"A. Biswas, Sarnali Basak","doi":"10.1109/ICCT46177.2019.8969031","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969031","url":null,"abstract":"Last few years in Bangladesh, the crime rate has increased rapidly. Hence it is an essential task to analyze and predict the crime so that the authority can minimize or prevent the crimes easily. In this situation, machine learning can perform a notable role to reveal the crime trends and patterns of Bangladesh. Here, various machine learning regression models i.e. linear regression, polynomial regression, and random forest regression are used to forecast the trends and patterns of crime in Bangladesh. Dataset used in this research is available for the public which is gathered from the Bangladesh police’s website. The dataset comprises record about various crime types i.e. dacoity, robbery, kidnapping, murder, women & child repression, theft, burglary, arms act, explosive, narcotics, and smuggling of Bangladesh. Firstly, training of regression models is done on the training dataset. After completion of the training, forecasting of crime is performed on the test data by the different regression models. Then we compare the forecasting results with the actual results and calculate the model evaluation metrics for the different applied regression models. After comparing the result, it is possible to find out the best-suited regression model for the crime-related data among all the applied regression models. Finally, it is observed that polynomial and random forest regression are better to predict the crime trends and patterns than the linear regression.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1