首页 > 最新文献

2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Smart Glasses for Visually Impaired Using Image Processing Techniques 使用图像处理技术的视障人士智能眼镜
P. Karthikayan, R. Pushpakumar
In this world, approximately 300 million are visually impaired, smart glasses helps the people who are Visually Impaired to enhance their life. With the help of this device they can navigate independently, feel convenient in the society, and also feel secure. They have many problems in their life, some of them are they cannot navigate independently, cheated in terms of money, Bus or Train number identification etc. In this system two features are implemented they are Currency Recognition and Traffic Light Detection. A Machine Learning (ML) Model is configured which consists of Convolution Neutral Network (CNN), image processing techniques, and Object detection model. Currency recognition extracts both visible and hided marks on the money for effective classification. Traffic light detection uses an image processing algorithm with standard object recognition methods. This system helps the Visually Impaired to cross the road without other's help. For the first feature i.e. Currency recognition, the output is the value of the currency that person has in his/her hand and for the second feature i.e. Traffic light detection, the output is whether the traffic light is red or green, if it is green then the number of seconds that person has to cross the road.
在这个世界上,大约有3亿人视力受损,智能眼镜可以帮助视力受损的人改善他们的生活。在这个设备的帮助下,他们可以独立导航,在社会中感到方便,也感到安全。他们在生活中有很多问题,其中一些是他们不能独立导航,在金钱,公共汽车或火车号码识别等方面被骗。该系统实现了货币识别和红绿灯检测两个功能。配置机器学习(ML)模型,该模型由卷积神经网络(CNN)、图像处理技术和对象检测模型组成。货币识别同时提取货币上的可见标记和隐藏标记进行有效分类。红绿灯检测使用图像处理算法与标准的目标识别方法。这个系统帮助视障人士在没有别人帮助的情况下过马路。对于第一个特征,即货币识别,输出是该人手中的货币价值;对于第二个特征,即交通灯检测,输出是交通灯是红色还是绿色,如果是绿色,则该人必须过马路的秒数。
{"title":"Smart Glasses for Visually Impaired Using Image Processing Techniques","authors":"P. Karthikayan, R. Pushpakumar","doi":"10.1109/I-SMAC52330.2021.9640715","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640715","url":null,"abstract":"In this world, approximately 300 million are visually impaired, smart glasses helps the people who are Visually Impaired to enhance their life. With the help of this device they can navigate independently, feel convenient in the society, and also feel secure. They have many problems in their life, some of them are they cannot navigate independently, cheated in terms of money, Bus or Train number identification etc. In this system two features are implemented they are Currency Recognition and Traffic Light Detection. A Machine Learning (ML) Model is configured which consists of Convolution Neutral Network (CNN), image processing techniques, and Object detection model. Currency recognition extracts both visible and hided marks on the money for effective classification. Traffic light detection uses an image processing algorithm with standard object recognition methods. This system helps the Visually Impaired to cross the road without other's help. For the first feature i.e. Currency recognition, the output is the value of the currency that person has in his/her hand and for the second feature i.e. Traffic light detection, the output is whether the traffic light is red or green, if it is green then the number of seconds that person has to cross the road.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124257453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malware Multi Perspective Analytics with Auto Deduction in Cybersecurity 网络安全中带有自动推理的恶意软件多视角分析
S. Srinivasan, P. Deepalakshmi
Machine Learning involves conceiving algorithms that enable computin The corporates and enterprises success are increasingly dependent on technology, system security, and its infrastructure. The corporates are committed to secure millions of customer’s data, clients, employees and other stakeholder’s information. Due to the increasing number of securities breaches, it proves information security fiascos may consequence trendy of substantial damage to a company’s reputation and customer’s trust. Also, the corporates that lose a substantial amount of revenue parched may face fines for failing to protect customer information. Therefore, it is imperative that organizations have proper security measures in place. To certify the superior configuration among the enterprises information system security plans and protecting customer in-formation, this proposal launches security research called cybersecurity along with how the malware analytics support cyber security in the space of Securing Internet of Things (SIoT) domain. The research is focusing on cyber security which essentially focuses on protecting the information with various analytics with auto malware deductions. Malware auto detections and analytics helps multifaceted in the development of logical data sets which is the combination from small to large data sets which expose data in concealed forms, unidentified associations, and preferences of customers to establish the cybersecurity of their enterprise.
公司和企业的成功越来越依赖于技术、系统安全性及其基础设施。这些公司致力于保护数百万客户的数据、客户、员工和其他利益相关者的信息。由于越来越多的安全漏洞,这证明了信息安全惨败可能会对公司的声誉和客户的信任造成重大损害。此外,那些损失了大量收入的公司可能会因未能保护客户信息而面临罚款。因此,组织必须有适当的安全措施。为了证明企业信息系统安全计划的卓越配置,保护客户信息,本提案开展了网络安全研究,以及恶意软件分析如何在安全物联网(SIoT)领域支持网络安全。该研究的重点是网络安全,主要是通过各种分析和自动恶意软件扣除来保护信息。恶意软件自动检测和分析有助于多层面的逻辑数据集的开发,这是从小数据集到大数据集的组合,这些数据集以隐藏的形式暴露数据,未识别的关联和客户偏好,以建立企业的网络安全。
{"title":"Malware Multi Perspective Analytics with Auto Deduction in Cybersecurity","authors":"S. Srinivasan, P. Deepalakshmi","doi":"10.1109/I-SMAC52330.2021.9640803","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640803","url":null,"abstract":"Machine Learning involves conceiving algorithms that enable computin The corporates and enterprises success are increasingly dependent on technology, system security, and its infrastructure. The corporates are committed to secure millions of customer’s data, clients, employees and other stakeholder’s information. Due to the increasing number of securities breaches, it proves information security fiascos may consequence trendy of substantial damage to a company’s reputation and customer’s trust. Also, the corporates that lose a substantial amount of revenue parched may face fines for failing to protect customer information. Therefore, it is imperative that organizations have proper security measures in place. To certify the superior configuration among the enterprises information system security plans and protecting customer in-formation, this proposal launches security research called cybersecurity along with how the malware analytics support cyber security in the space of Securing Internet of Things (SIoT) domain. The research is focusing on cyber security which essentially focuses on protecting the information with various analytics with auto malware deductions. Malware auto detections and analytics helps multifaceted in the development of logical data sets which is the combination from small to large data sets which expose data in concealed forms, unidentified associations, and preferences of customers to establish the cybersecurity of their enterprise.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Impact of Strength Picture on Convolving with Regulation 强度图像对正则卷积的影响
K. Koti, Guna Sekhar Sajja, Dennis Arias-Chávez, R. Rajasekaran, Regin Rajan, D. Vijendra Babu
Image Deblurring is a common restoration issue. However, existing deep learning approaches have generalization and interpretability issues. This research work provides a framework capable of regulated, confidence-based noise removal in this project to address these issues. The framework is built on merging two denoised images, both of which were generated from the same noisy input. One of the two is denoised using generic algorithms (for example, Gaussian), making few assumptions about the input images and generalizing across all cases. The other uses deep learning to denoise data and performs well on known datasets. Also, this research work presents a series of strategies for seamlessly fusing the two components in the frequency domain. Also, this research work presents a fusion technique that protects users from out-of-distribution inputs and estimates the confidence of a deep learning denoiser to allow users to interpret the result. Further, this research work will illustrate the efficacy of the suggested framework in various use cases through experiments.
图像去模糊是一个常见的修复问题。然而,现有的深度学习方法存在泛化和可解释性问题。这项研究工作提供了一个框架,能够在这个项目中进行规范的、基于信心的降噪,以解决这些问题。该框架是建立在合并两个去噪图像的基础上的,这两个图像都是由相同的噪声输入产生的。其中一个使用通用算法(例如高斯算法)去噪,对输入图像做很少的假设,并泛化到所有情况。另一个使用深度学习对数据进行降噪,并在已知数据集上表现良好。此外,本研究还提出了一系列在频域中无缝融合两分量的策略。此外,这项研究工作提出了一种融合技术,可以保护用户免受分布外输入的影响,并估计深度学习去噪器的置信度,以允许用户解释结果。此外,本研究工作将通过实验说明所建议的框架在各种用例中的有效性。
{"title":"Impact of Strength Picture on Convolving with Regulation","authors":"K. Koti, Guna Sekhar Sajja, Dennis Arias-Chávez, R. Rajasekaran, Regin Rajan, D. Vijendra Babu","doi":"10.1109/I-SMAC52330.2021.9640851","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640851","url":null,"abstract":"Image Deblurring is a common restoration issue. However, existing deep learning approaches have generalization and interpretability issues. This research work provides a framework capable of regulated, confidence-based noise removal in this project to address these issues. The framework is built on merging two denoised images, both of which were generated from the same noisy input. One of the two is denoised using generic algorithms (for example, Gaussian), making few assumptions about the input images and generalizing across all cases. The other uses deep learning to denoise data and performs well on known datasets. Also, this research work presents a series of strategies for seamlessly fusing the two components in the frequency domain. Also, this research work presents a fusion technique that protects users from out-of-distribution inputs and estimates the confidence of a deep learning denoiser to allow users to interpret the result. Further, this research work will illustrate the efficacy of the suggested framework in various use cases through experiments.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Analysis of High Throughput Traffic on Tor 基于Tor的高吞吐量流量分析
G. Mani, P. Srinivas, G. Rao, Chitturi Prasad, Donepudi Priyanka, Naresh Cherukuri
Tor is a popular anonymity network used by millions to access internet services while maintaining their privacy. The main concept behind Tor is that a user can build a "circuit" of routers called relays, where each relay carries the client’s traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination.However, a paper written in 2005 titled "Low-Cost Traffic Analysis of Tor" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network by calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them.This paper was written in 2005, when Tor was still young. At the time of Murdoch and Danezis’ paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not be masked by other traffic.Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.
Tor是一个受欢迎的匿名网络,数百万人使用它来访问互联网服务,同时保护他们的隐私。Tor背后的主要概念是,用户可以建立一个称为中继的路由器“电路”,其中每个中继将客户端的流量传递给下一个中继,而无需任何一个中继知道路径的全部范围。这样就实现了匿名性,因为没有一个中继可以跟踪客户端到目的地。然而,2005年由Steven J. Murdoch和George Danez撰写的一篇题为“Tor的低成本流量分析”的论文证明了流量分析攻击是可能针对Tor网络的。任何攻击者都可以通过计算到中继的往返时间(RTT)来监视Tor网络中中继上的负载,当RTT达到峰值时,很明显该中继正在被使用。有了这些信息,攻击者就可以追踪Tor网络中客户端的路径,并将其去匿名化。这篇论文写于2005年,当时Tor还很年轻。在默多克和达内齐斯发表论文的时候,整个Tor网络只有50个中继。在撰写本文时,网络中有超过7,000个中继,因此Tor的生态系统完全不同。随着流量的增加,非常需要确定这种类型的攻击是否仍然有效,并且不会被其他流量掩盖。我们的结果表明,如果受害者下载或流式传输大文件的速度达到Tor允许的速度,则通常可以在电路中的每个中继上观察到带宽的减少和往返时间(RTT)的增加。这项研究工作还发现了Tor保护中继,这是一个特殊的中继子集,客户端将选择作为其电路中的第一跳,非常容易受到这种攻击。
{"title":"Traffic Analysis of High Throughput Traffic on Tor","authors":"G. Mani, P. Srinivas, G. Rao, Chitturi Prasad, Donepudi Priyanka, Naresh Cherukuri","doi":"10.1109/I-SMAC52330.2021.9640934","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640934","url":null,"abstract":"Tor is a popular anonymity network used by millions to access internet services while maintaining their privacy. The main concept behind Tor is that a user can build a \"circuit\" of routers called relays, where each relay carries the client’s traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination.However, a paper written in 2005 titled \"Low-Cost Traffic Analysis of Tor\" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network by calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them.This paper was written in 2005, when Tor was still young. At the time of Murdoch and Danezis’ paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not be masked by other traffic.Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116019077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Affective Music Player for Multiple Emotion Recognition Using Facial Expressions with SVM 基于支持向量机的面部表情多重情感识别情感音乐播放器
Supriya L P, Rashmita Khilar
Affective computing is a form of machinery that enables the machine to respond to a human stimulus in some way, usually associated with sophisticated mood or emotional indications. This emotion based music player project is a novel approach that helps the user play songs automatically based on the user's emotions. This understands user's facial emotions and plays the songs according to their emotions. Music as a major impact on the regular life of human beings and in innovative, progressive technologies. Generally the operator needs to do with the challenge of looking for songs manually navigate through the playlist to choose from. At this point it suggests an effective and precise model, which would produce a playlist constructed on the user's present emotional state and behavior. Existing strategies to mechanize the method of creating the playlist are computationally moderate, less solid and some of the time includes the utilization of additional hardware. Discourse is the foremost antiquated and ordinary way of communicating considerations, feelings, and temperament and it requires tall specialized, time, and taken a toll. This proposed framework is based on extricating facial expressions in real-time, as well as extricating sound highlights from tunes to decipher into a specific feeling that will naturally produce a playlist so that the fetched of handling is moderately low. The Emotions are recognized using Support Vector Machine (SVM) . The webcam captures the user's image. It then extracts the user's facial features from the captured image. The music will be played from the pre- defined files, depending on the emotion.
情感计算是一种机器,它使机器能够以某种方式对人类的刺激做出反应,通常与复杂的情绪或情绪指示有关。这个基于情感的音乐播放器项目是一种新颖的方法,可以帮助用户根据用户的情感自动播放歌曲。它可以理解用户的面部情绪,并根据他们的情绪播放歌曲。音乐对人类的日常生活和创新、进步的技术产生了重大影响。一般来说,操作人员需要面对的挑战是,手动在播放列表中寻找歌曲,从中进行选择。在这一点上,它提出了一个有效而精确的模型,该模型将根据用户当前的情绪状态和行为产生一个播放列表。现有的创建播放列表的方法的机械化策略在计算上是适度的,不太可靠,并且有时包括使用额外的硬件。话语是传达思想、情感和气质的最古老和最普通的方式,它需要很高的专业知识、时间和代价。这个提议的框架是基于实时提取面部表情,以及从曲调中提取声音亮点来解码成一种特定的感觉,这种感觉会自然地产生一个播放列表,这样处理的难度就适中了。使用支持向量机(SVM)识别情绪。网络摄像头捕捉用户的图像。然后,它从捕获的图像中提取用户的面部特征。音乐将从预先定义的文件中播放,取决于情绪。
{"title":"Affective Music Player for Multiple Emotion Recognition Using Facial Expressions with SVM","authors":"Supriya L P, Rashmita Khilar","doi":"10.1109/I-SMAC52330.2021.9640706","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640706","url":null,"abstract":"Affective computing is a form of machinery that enables the machine to respond to a human stimulus in some way, usually associated with sophisticated mood or emotional indications. This emotion based music player project is a novel approach that helps the user play songs automatically based on the user's emotions. This understands user's facial emotions and plays the songs according to their emotions. Music as a major impact on the regular life of human beings and in innovative, progressive technologies. Generally the operator needs to do with the challenge of looking for songs manually navigate through the playlist to choose from. At this point it suggests an effective and precise model, which would produce a playlist constructed on the user's present emotional state and behavior. Existing strategies to mechanize the method of creating the playlist are computationally moderate, less solid and some of the time includes the utilization of additional hardware. Discourse is the foremost antiquated and ordinary way of communicating considerations, feelings, and temperament and it requires tall specialized, time, and taken a toll. This proposed framework is based on extricating facial expressions in real-time, as well as extricating sound highlights from tunes to decipher into a specific feeling that will naturally produce a playlist so that the fetched of handling is moderately low. The Emotions are recognized using Support Vector Machine (SVM) . The webcam captures the user's image. It then extracts the user's facial features from the captured image. The music will be played from the pre- defined files, depending on the emotion.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"27 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Application of Digital Party Building Cloud Platform based on C# and Opencv 基于c#和Opencv的数字党建云平台的设计与应用
Xue‐cheng Bian
Party building is the core driving force to lead the work of grass-roots tax departments forward. Strengthening the party building of grass-roots tax departments plays an extremely important role in promoting the tax cause. In this form, the party's grass-roots construction is also in a major transformation stage. The government, state-owned enterprises and colleges all attach great importance to the management of the construction of grass-roots party organizations. The software development environment of this system is visual studio 2015 and opencv 3.4.2. The core code is written by C + +, and the software interface is written by C #. In this paper, many cases are tested and the test results are counted. The test results show that the system can accurately detect and track moving targets.
党的建设是领导基层税务部门工作向前发展的核心动力。加强基层税务部门的党建工作,对促进税收事业的发展具有极其重要的作用。在这种形式下,党的基层建设也处于重大转型阶段。政府、国有企业和高校都十分重视基层党组织建设的管理工作。本系统的软件开发环境为visual studio 2015和opencv 3.4.2。核心代码用c++编写,软件接口用c#编写。本文对多个案例进行了测试,并对测试结果进行了统计。测试结果表明,该系统能够准确地检测和跟踪运动目标。
{"title":"Design and Application of Digital Party Building Cloud Platform based on C# and Opencv","authors":"Xue‐cheng Bian","doi":"10.1109/I-SMAC52330.2021.9640858","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640858","url":null,"abstract":"Party building is the core driving force to lead the work of grass-roots tax departments forward. Strengthening the party building of grass-roots tax departments plays an extremely important role in promoting the tax cause. In this form, the party's grass-roots construction is also in a major transformation stage. The government, state-owned enterprises and colleges all attach great importance to the management of the construction of grass-roots party organizations. The software development environment of this system is visual studio 2015 and opencv 3.4.2. The core code is written by C + +, and the software interface is written by C #. In this paper, many cases are tested and the test results are counted. The test results show that the system can accurately detect and track moving targets.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114157697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-cost Robot for Autonomous Disinfection of Corridors 用于走廊自动消毒的低成本机器人
Sandhya Vidyashankar, G. Srinivasa
The rise of COVID-19 has precipitated an increased importance of cleaning and sanitation, ideally without human intervention. This paper proposes a solution to meet this emerging need by means of a low-cost fully autonomous robot equipped with pumps for sanitation spray. The robot is designed for disinfection of corridors such as those in grocery stores, hotels etc., using the readily available peroxide disinfectant. It is controlled using an Arduino Uno and can efficiently avoid obstacles. For further convenience, the robot design is modular to ensure protection of the electronics as well as ease of charging and unskilled operation.
COVID-19的兴起使得清洁和卫生变得更加重要,理想情况下无需人为干预。本文提出了一种解决方案,通过配备卫生喷雾泵的低成本全自动机器人来满足这一新兴需求。该机器人专为杂货店、酒店等走廊消毒而设计,使用现成的过氧化氢消毒剂。它使用Arduino Uno进行控制,可以有效地避开障碍物。为了进一步方便,机器人的设计是模块化的,以确保电子设备的保护,以及易于充电和不熟练的操作。
{"title":"Low-cost Robot for Autonomous Disinfection of Corridors","authors":"Sandhya Vidyashankar, G. Srinivasa","doi":"10.1109/I-SMAC52330.2021.9640952","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640952","url":null,"abstract":"The rise of COVID-19 has precipitated an increased importance of cleaning and sanitation, ideally without human intervention. This paper proposes a solution to meet this emerging need by means of a low-cost fully autonomous robot equipped with pumps for sanitation spray. The robot is designed for disinfection of corridors such as those in grocery stores, hotels etc., using the readily available peroxide disinfectant. It is controlled using an Arduino Uno and can efficiently avoid obstacles. For further convenience, the robot design is modular to ensure protection of the electronics as well as ease of charging and unskilled operation.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate Breast Cancer Detection and Classification by Machine Learning Approach 基于机器学习方法的乳腺癌准确检测与分类
D. Sandeep, G. Bethel
In this paper there is comparison of four different machine learning algorithms such as Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Fuzzy logic and Genetic algorithm on Wisconsin Breast Cancer Diagnosis (WBCD) dataset for the detection of breast cancer in women. The test accuracies are compared to show the efficient algorithm for the detection of breast cancer using those algorithms. The dataset is partitioned to 70% training data and 30% testing data. The results for the applied algorithms are CNN acquired 96.49% accuracy, RNN acquired 63.15% accuracy, fuzzy logic acquired 88.81% accuracy, and genetic algorithm acquired 80.399% accuracy.
本文比较了卷积神经网络(CNN)、递归神经网络(RNN)、模糊逻辑和遗传算法等四种不同的机器学习算法在威斯康星乳腺癌诊断(WBCD)数据集上对女性乳腺癌的检测。将测试的准确性进行比较,以显示使用这些算法检测乳腺癌的有效算法。数据集被划分为70%的训练数据和30%的测试数据。应用算法的结果是:CNN准确率为96.49%,RNN准确率为63.15%,模糊逻辑准确率为88.81%,遗传算法准确率为80.399%。
{"title":"Accurate Breast Cancer Detection and Classification by Machine Learning Approach","authors":"D. Sandeep, G. Bethel","doi":"10.1109/I-SMAC52330.2021.9640710","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640710","url":null,"abstract":"In this paper there is comparison of four different machine learning algorithms such as Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Fuzzy logic and Genetic algorithm on Wisconsin Breast Cancer Diagnosis (WBCD) dataset for the detection of breast cancer in women. The test accuracies are compared to show the efficient algorithm for the detection of breast cancer using those algorithms. The dataset is partitioned to 70% training data and 30% testing data. The results for the applied algorithms are CNN acquired 96.49% accuracy, RNN acquired 63.15% accuracy, fuzzy logic acquired 88.81% accuracy, and genetic algorithm acquired 80.399% accuracy.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Swarm solar rooftop system using 6 DoF parallel manipulators and two axes linear movement 蜂群太阳能屋顶系统采用六自由度并联机械手和两轴直线运动
Soham Parlikar, Gauri Karnik
Solar energy is an emerging source of electricity in today’s world, and It has been playing an eminent role in generating maximum energy to comply with everyday needs. Solar energy totally depends on the sun’s irradiation and the various sun path angles, so to achieve maximum efficiency, the solar panels need to be facing the direction with maximum solar irradiation. As solar panels are mainly placed on the top of buildings or terraces, to retain the elegance of the building, solar panels can be arranged in specific dynamically arranged patterns, which can be used to visualize the waving effect. This paper proposes a novel method to incorporate the use of 6 DoF parallel manipulators attached to linear movable XY axes, to achieve the tracking of sun path for gaining maximum efficiency and to depict various visual motions such as waves, swarm movement of solar panels in terms of architectural efficacy.
太阳能是当今世界一种新兴的电力来源,它在产生最大的能源以满足日常需求方面发挥着重要作用。太阳能完全依赖于太阳的照射和各种太阳路径角度,所以为了达到最大的效率,太阳能电池板需要朝向太阳照射最大的方向。由于太阳能电池板主要放置在建筑物的顶部或露台上,为了保留建筑物的优雅,可以将太阳能电池板排列成特定的动态排列模式,从而可以将波浪效果可视化。本文提出了一种新颖的方法,结合使用6自由度并联机械手附着在线性可移动的XY轴上,实现太阳路径的跟踪,以获得最大的效率,并在建筑功效方面描绘各种视觉运动,如波浪,蜂群运动的太阳能电池板。
{"title":"Swarm solar rooftop system using 6 DoF parallel manipulators and two axes linear movement","authors":"Soham Parlikar, Gauri Karnik","doi":"10.1109/I-SMAC52330.2021.9640721","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640721","url":null,"abstract":"Solar energy is an emerging source of electricity in today’s world, and It has been playing an eminent role in generating maximum energy to comply with everyday needs. Solar energy totally depends on the sun’s irradiation and the various sun path angles, so to achieve maximum efficiency, the solar panels need to be facing the direction with maximum solar irradiation. As solar panels are mainly placed on the top of buildings or terraces, to retain the elegance of the building, solar panels can be arranged in specific dynamically arranged patterns, which can be used to visualize the waving effect. This paper proposes a novel method to incorporate the use of 6 DoF parallel manipulators attached to linear movable XY axes, to achieve the tracking of sun path for gaining maximum efficiency and to depict various visual motions such as waves, swarm movement of solar panels in terms of architectural efficacy.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Research-Oriented Mathematical Model for Cloud Simulations 面向研究的云模拟数学模型
Moin Hasan, Mohammad Anwarul Siddique
Cloud computing draws immense attraction of the researchers worldwide. It has now become a base paradigm of almost every growing organization. To carry out fruitful research, rigorous experimentation is always required. Commercially, large-scale cloud data centers consist of tens of thousands of physical servers to fulfil the users’ requests across the globe. Therefore, it is not feasible for every researcher to conduct the research experiments and test their proposed algorithms/methods/frameworks over the real cloud environment. Alternately, simulation experiments can be performed. To perform the simulation experiments, standard and research-oriented mathematical modelling of the cloud architecture is required which can be easily implemented using any of the programming languages. To this requirement, this article discusses such a mathematical model of cloud computing architecture consisting of different cloud entities. The discussed model can be easily implemented using any programming language or simulator to perform the research experiments.
云计算在世界范围内引起了研究人员的极大关注。它现在已经成为几乎每个成长型组织的基本范例。为了进行卓有成效的研究,总是需要严格的实验。商业上,大型云数据中心由数以万计的物理服务器组成,以满足全球用户的请求。因此,并不是每个研究人员都可以在真实的云环境中进行研究实验和测试他们提出的算法/方法/框架。或者,可以进行模拟实验。为了进行模拟实验,需要对云架构进行标准的、面向研究的数学建模,该模型可以使用任何编程语言轻松实现。针对这一需求,本文讨论了由不同云实体组成的云计算体系结构的数学模型。所讨论的模型可以很容易地实现,使用任何编程语言或模拟器进行研究实验。
{"title":"A Research-Oriented Mathematical Model for Cloud Simulations","authors":"Moin Hasan, Mohammad Anwarul Siddique","doi":"10.1109/I-SMAC52330.2021.9640902","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640902","url":null,"abstract":"Cloud computing draws immense attraction of the researchers worldwide. It has now become a base paradigm of almost every growing organization. To carry out fruitful research, rigorous experimentation is always required. Commercially, large-scale cloud data centers consist of tens of thousands of physical servers to fulfil the users’ requests across the globe. Therefore, it is not feasible for every researcher to conduct the research experiments and test their proposed algorithms/methods/frameworks over the real cloud environment. Alternately, simulation experiments can be performed. To perform the simulation experiments, standard and research-oriented mathematical modelling of the cloud architecture is required which can be easily implemented using any of the programming languages. To this requirement, this article discusses such a mathematical model of cloud computing architecture consisting of different cloud entities. The discussed model can be easily implemented using any programming language or simulator to perform the research experiments.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1