首页 > 最新文献

2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Future Driver Assistant with Reconfigurable On-Board Diagnostics system 具有可重构车载诊断系统的未来驾驶助理
V. A, S. Vanaja, B. Sathyasri, R. S., Ramyaa D, Prem S
Nowadays, automation is the most efficient resource mechanism which is available in day today life in an economical way. In daily circumstances, life is not possible without automotive mechanism. The automotive method adopted in this system would be by displaying the various parameters through an informative system. So, our aim is to develop an informative system to indicate multiple parameters of the automobile resources like fuel, engine temperature, AC voltage in engine, air, battery voltage, wear out temperature, hydrocarbons quantity and machine speed. The proposed system is useful for any users for recognizing the various parameters in a single and compact Liquid Crystal Display. A voice recorder Integrated Circuit has been used in this project to produce warning voice signals during abnormal conditions of resources. This project involves the usage of the latest embedded microcontroller. In case of any abnormal situations some points are set to stir the end user for the itemize specifications as well as for each and every action is -taking place is stipulated with the help of voice output.
如今,自动化是最有效的资源机制,可以在当今生活中以经济的方式获得。在日常生活中,没有汽车机械是不可能的。该系统采用的自动化方法是通过信息系统显示各种参数。因此,我们的目标是开发一个信息系统来显示汽车资源的多个参数,如燃料、发动机温度、发动机交流电压、空气、电池电压、磨损温度、碳氢化合物数量和机器速度。该系统适用于任何用户在一个单一的、紧凑的液晶显示器上识别各种参数。本项目采用录音集成电路,在资源异常情况下产生报警语音信号。这个项目涉及到最新的嵌入式微控制器的使用。在任何异常情况下,设置一些点来搅动最终用户的逐项规范,并在语音输出的帮助下规定每个正在发生的动作。
{"title":"Future Driver Assistant with Reconfigurable On-Board Diagnostics system","authors":"V. A, S. Vanaja, B. Sathyasri, R. S., Ramyaa D, Prem S","doi":"10.1109/I-SMAC52330.2021.9640737","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640737","url":null,"abstract":"Nowadays, automation is the most efficient resource mechanism which is available in day today life in an economical way. In daily circumstances, life is not possible without automotive mechanism. The automotive method adopted in this system would be by displaying the various parameters through an informative system. So, our aim is to develop an informative system to indicate multiple parameters of the automobile resources like fuel, engine temperature, AC voltage in engine, air, battery voltage, wear out temperature, hydrocarbons quantity and machine speed. The proposed system is useful for any users for recognizing the various parameters in a single and compact Liquid Crystal Display. A voice recorder Integrated Circuit has been used in this project to produce warning voice signals during abnormal conditions of resources. This project involves the usage of the latest embedded microcontroller. In case of any abnormal situations some points are set to stir the end user for the itemize specifications as well as for each and every action is -taking place is stipulated with the help of voice output.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126060181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Software Simulation in Guiding Reform of Engineering Project with VR Tools 软件仿真在VR工具指导工程项目改革中的应用
Jianhua Li
BIM is a kind of engineering data model which can integrate all kinds of information in the whole process of construction engineering. It is based on three-dimensional digital technology and provides the basis for collaborative work. It can integrate all kinds of information data and set up simulation model by setting parameters to simulate building entity, construction process and operation situation. Based on the secondary development technology of engineering software, this paper studies API development tools. Through the establishment of parametric family library, this paper develops a rapid modeling method for rapid generation of water conservancy and hydropower project model, and finally realizes the construction schedule simulation by using the cooperation of VR tool related software and NavisWorks software.
BIM是一种工程数据模型,可以将建筑工程全过程中的各种信息进行集成。它以三维数字技术为基础,为协同工作提供了基础。它可以整合各种信息数据,通过设置参数建立仿真模型,模拟建筑实体、施工过程和运行情况。本文以工程软件二次开发技术为基础,研究了API开发工具。本文通过参数族库的建立,开发了一种快速生成水利水电工程模型的快速建模方法,并利用VR工具相关软件与NavisWorks软件的协同,最终实现了施工进度仿真。
{"title":"Application of Software Simulation in Guiding Reform of Engineering Project with VR Tools","authors":"Jianhua Li","doi":"10.1109/I-SMAC52330.2021.9640666","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640666","url":null,"abstract":"BIM is a kind of engineering data model which can integrate all kinds of information in the whole process of construction engineering. It is based on three-dimensional digital technology and provides the basis for collaborative work. It can integrate all kinds of information data and set up simulation model by setting parameters to simulate building entity, construction process and operation situation. Based on the secondary development technology of engineering software, this paper studies API development tools. Through the establishment of parametric family library, this paper develops a rapid modeling method for rapid generation of water conservancy and hydropower project model, and finally realizes the construction schedule simulation by using the cooperation of VR tool related software and NavisWorks software.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126828836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Advance Pill Reminder System for Distinct Patients 基于物联网的不同患者提前提醒系统
Abhishek A. Madankar, Akhilesh Agrawal, Vedant Yede
When it comes to loved ones, humans strive to keep them fit and healthy at all times. But what if they forget to take their medicine and become ill as a result? Hence, many patients require medication at the health care center, and it is difficult for us to remind each patient to take medicine at a specific time. Traditional way requires lot of human effort to remind the patient to take medicine. But in this digital era, humans make use of machines to do certain works. Pill remainder has a wide range of uses, including use by patients at home, doctors in hospitals, and a variety of other settings. This paper presents a working of advance pill remainder setup, which can remove asymmetry in taking medicine dosages and remind the patient to take medicine at prescribed time and particular number of dosages. In this approach, the users are switching from human memory to automated supervision.
当涉及到所爱的人时,人类总是努力让他们保持健康。但是如果他们忘记吃药而生病了怎么办?因此,很多患者需要在保健中心服药,我们很难提醒每个患者在特定的时间服药。传统的方法需要大量的人力来提醒病人吃药。但在这个数字时代,人类利用机器来做某些工作。剩余药丸有广泛的用途,包括病人在家里、医生在医院和各种其他环境中使用。本文介绍了一种提前剩药装置的工作原理,它可以消除服药剂量的不对称,提醒患者按规定的时间和特定的剂量服药。在这种方法中,用户正在从人类记忆切换到自动监督。
{"title":"IoT based Advance Pill Reminder System for Distinct Patients","authors":"Abhishek A. Madankar, Akhilesh Agrawal, Vedant Yede","doi":"10.1109/I-SMAC52330.2021.9640866","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640866","url":null,"abstract":"When it comes to loved ones, humans strive to keep them fit and healthy at all times. But what if they forget to take their medicine and become ill as a result? Hence, many patients require medication at the health care center, and it is difficult for us to remind each patient to take medicine at a specific time. Traditional way requires lot of human effort to remind the patient to take medicine. But in this digital era, humans make use of machines to do certain works. Pill remainder has a wide range of uses, including use by patients at home, doctors in hospitals, and a variety of other settings. This paper presents a working of advance pill remainder setup, which can remove asymmetry in taking medicine dosages and remind the patient to take medicine at prescribed time and particular number of dosages. In this approach, the users are switching from human memory to automated supervision.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"2 6-7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A detailed study on sentimental analysis using Twitter data with an Improved deep learning model 使用改进的深度学习模型对Twitter数据进行情感分析的详细研究
Bhavani M, Shrijeeth S, Rohit M, Sanjeev Krishnan R, Sharveshwaran R
Under the present developments and current situation, the entire globe is changing fast. With the Internet being utilized in every sector, the internet has become a necessary requirement for everyone. With the quick expansion in informal community applications, individuals are utilizing these stages to voice their sentiments as to everyday issues. Assembling and investigating people's reactions toward purchasing an item, public administrations are essential. Sentiment analysis is a common dialogue preparing task that aims to discover the sentiments behind opinions in texts on varying subjects [1]. As of late, analysts in the field of estimation examination have been worried about dissecting suppositions on various subjects, for example, films, business items, and day by day cultural issues. Twitter is a gigantically mainstream microblog on which customers may voice their assessments. Assessment examination of Twitter information is a field that has been given a lot of consideration in the course of the most recent decade and includes taking apart "tweets" and the substance of these articulations. In this paper, a deep learning model has been made with Embedding, CNN and LSTM layers. Then tweets from the web are collected for a particular topic using the Web Scraping technique by Twitter API and the overall sentiment is analyzed and a detailed sentiment report is made for that particular topic.
在当前的发展和形势下,整个地球都在快速变化。随着互联网在各个领域的应用,互联网已经成为每个人的必要要求。随着非正式社区应用程序的迅速扩展,个人正在利用这些阶段来表达他们对日常问题的看法。收集和调查人们对购买物品的反应,公共管理是必不可少的。情感分析是一种常见的对话准备任务,旨在发现不同主题文本中观点背后的情感[1]。最近,评估检查领域的分析人员一直在担心对各种主题的剖析假设,例如,电影、业务项目和日常文化问题。Twitter是一个巨大的主流微博,顾客可以在上面发表他们的评价。Twitter信息的评估检查是一个在最近十年中被给予了很多考虑的领域,包括分解“tweet”和这些表述的实质。本文利用嵌入层、CNN层和LSTM层构建了深度学习模型。然后使用Twitter API的web抓取技术从网络上收集特定主题的推文,并分析整体情绪,并为该特定主题制作详细的情绪报告。
{"title":"A detailed study on sentimental analysis using Twitter data with an Improved deep learning model","authors":"Bhavani M, Shrijeeth S, Rohit M, Sanjeev Krishnan R, Sharveshwaran R","doi":"10.1109/I-SMAC52330.2021.9640850","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640850","url":null,"abstract":"Under the present developments and current situation, the entire globe is changing fast. With the Internet being utilized in every sector, the internet has become a necessary requirement for everyone. With the quick expansion in informal community applications, individuals are utilizing these stages to voice their sentiments as to everyday issues. Assembling and investigating people's reactions toward purchasing an item, public administrations are essential. Sentiment analysis is a common dialogue preparing task that aims to discover the sentiments behind opinions in texts on varying subjects [1]. As of late, analysts in the field of estimation examination have been worried about dissecting suppositions on various subjects, for example, films, business items, and day by day cultural issues. Twitter is a gigantically mainstream microblog on which customers may voice their assessments. Assessment examination of Twitter information is a field that has been given a lot of consideration in the course of the most recent decade and includes taking apart \"tweets\" and the substance of these articulations. In this paper, a deep learning model has been made with Embedding, CNN and LSTM layers. Then tweets from the web are collected for a particular topic using the Web Scraping technique by Twitter API and the overall sentiment is analyzed and a detailed sentiment report is made for that particular topic.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of different video steganography approaches against man-in-the middle attacks 针对中间人攻击的不同视频隐写方法综述
V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad
Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.
隐写术对不同组织之间的数据进行有效加密是必要的。隐写术在通过视频传输机密数据方面具有重要的用途。然而,这很容易受到第三方攻击,如视频更改,版权更改,安全更新更改等。许多加密算法已被提出纳入数据隐藏技术。由于需要大量的敏感数据,这些模型需要强大的计算机内存和高处理周期来处理。在这种情况下,这些加密模型无法应用于大型视频数据进行完整性计算和加密。本文研究了不同的视频隐写方法及其在视频数据库中的局限性。
{"title":"A Survey of different video steganography approaches against man-in-the middle attacks","authors":"V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad","doi":"10.1109/I-SMAC52330.2021.9640974","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640974","url":null,"abstract":"Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded Network Database Encryption System Optimization Considering the B/S Structure and Software Optimization 考虑B/S结构和软件优化的嵌入式网络数据库加密系统优化
Qinmin Ma
With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information systems. The database management system comes with a basic security technology strategy, which can solve common database security requirements. However, for some special data security applications, the security technology strategy of the database itself cannot meet the requirements, which requires data encryption. Processing data encryption is the core content of information security research, and database encryption is an important means to improve database security. This paper studies the design of embedded network database system based on BS structure.
随着计算机网络技术的飞速发展,越来越多的单位和个人共享着丰富的数据资源,信息安全已成为网络信息系统要解决的首要问题。数据库管理系统具有基本的安全技术策略,可以解决常见的数据库安全需求。但是,对于一些特殊的数据安全应用,数据库本身的安全技术策略无法满足要求,需要对数据进行加密。处理数据加密是信息安全研究的核心内容,数据库加密是提高数据库安全性的重要手段。本文研究了基于BS结构的嵌入式网络数据库系统的设计。
{"title":"Embedded Network Database Encryption System Optimization Considering the B/S Structure and Software Optimization","authors":"Qinmin Ma","doi":"10.1109/I-SMAC52330.2021.9640735","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640735","url":null,"abstract":"With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information systems. The database management system comes with a basic security technology strategy, which can solve common database security requirements. However, for some special data security applications, the security technology strategy of the database itself cannot meet the requirements, which requires data encryption. Processing data encryption is the core content of information security research, and database encryption is an important means to improve database security. This paper studies the design of embedded network database system based on BS structure.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133240044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Enhancement based on Deep Convolutional Neural Network 基于深度卷积神经网络的语音增强
Ramesh Nuthakki, Payel Masanta, Yukta T N
Speech enhancement is the process of treating noisy speech signals so as to improve human perception as well as improve system understanding of the signal. For speech signals with medium or high signal to noise ratio (SNR), the aim is to produce subjectively pragmatic signal, and for signals having low SNR the aim is to reduce the noise while still maintaining the intelligibility. Many noise reduction algorithms improve overall speech quality but little progress has been made to improve the overall speech intelligibility. This paper proposes a deep convolutional neural network (DCNN) speech enhancement method by enhancing loss function such as extended short time objective ineligibility (ESTOI) and mean square error (MSE). These loss functions are improved using Harris Hawks Optimization (HHO). The enhanced speech signal is acquired by separating the clean speech signal from the noisy speech signal. By using various predictive measure of objective speech intelligibility like short time objective intelligibility, source to artefact ratio (SAR), coherence speech intelligibility index (CSII) and source to distortion ratio (SDR), the efficacy of speech enhancement is calculated. The quality of the enhanced speech signal is assessed using the quality measure such as speech distortion (SD) and perceptual evaluation of speech quality (PESQ).
语音增强是对带有噪声的语音信号进行处理,从而提高人的感知能力和系统对信号的理解能力的过程。对于中信噪比或高信噪比的语音信号,其目的是产生主观上语用的信号,对于低信噪比的信号,其目的是在保持可理解性的同时降低噪声。许多降噪算法提高了整体语音质量,但在提高整体语音可理解性方面进展甚微。本文提出了一种基于扩展短时目标不合格性(ESTOI)和均方误差(MSE)等损失函数的深度卷积神经网络(DCNN)语音增强方法。利用Harris Hawks Optimization (HHO)对这些损失函数进行了改进。通过将纯净语音信号与噪声语音信号分离得到增强语音信号。利用短时客观语音可理解度、源伪比(SAR)、相干语音可理解度指数(CSII)和源失真比(SDR)等客观语音可理解度的预测指标,计算语音增强效果。使用语音失真(SD)和语音质量感知评价(PESQ)等质量度量来评估增强语音信号的质量。
{"title":"Speech Enhancement based on Deep Convolutional Neural Network","authors":"Ramesh Nuthakki, Payel Masanta, Yukta T N","doi":"10.1109/I-SMAC52330.2021.9640736","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640736","url":null,"abstract":"Speech enhancement is the process of treating noisy speech signals so as to improve human perception as well as improve system understanding of the signal. For speech signals with medium or high signal to noise ratio (SNR), the aim is to produce subjectively pragmatic signal, and for signals having low SNR the aim is to reduce the noise while still maintaining the intelligibility. Many noise reduction algorithms improve overall speech quality but little progress has been made to improve the overall speech intelligibility. This paper proposes a deep convolutional neural network (DCNN) speech enhancement method by enhancing loss function such as extended short time objective ineligibility (ESTOI) and mean square error (MSE). These loss functions are improved using Harris Hawks Optimization (HHO). The enhanced speech signal is acquired by separating the clean speech signal from the noisy speech signal. By using various predictive measure of objective speech intelligibility like short time objective intelligibility, source to artefact ratio (SAR), coherence speech intelligibility index (CSII) and source to distortion ratio (SDR), the efficacy of speech enhancement is calculated. The quality of the enhanced speech signal is assessed using the quality measure such as speech distortion (SD) and perceptual evaluation of speech quality (PESQ).","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Intrusion Detection using Machine Learning Approaches 使用机器学习方法的网络入侵检测
Zakir Hossain, Md. Mahmudur Rahman Sourov, Musharrat Khan, Parves Rahman
At present network intrusion is regarded as a great threat in network usage and communication. Network intrusion detection system detects and prevents anomalous activities or attacks in networks. Many classifiers are used to detect network attacks. In this paper, we have evaluated the performance of four popular classifiers, namely, Decision Tree, Support Vector Machine, Random Forest and Naïve Bayes on UNSW-NB15 dataset using Python language along with its Pandas and SKlearn libraries. We have used the complete UNSW-NB15 dataset with 43 features. Experimental results have shown improvement of accuracy for Random Forest, Decision Tree and Naïve Bayes over previously reported results produced by Apache Spark and its MLlib.
目前,网络入侵被认为是网络使用和通信中的一大威胁。网络入侵检测系统用于检测和阻止网络中的异常活动或攻击。许多分类器被用来检测网络攻击。在本文中,我们使用Python语言及其Pandas和SKlearn库,评估了四种流行的分类器,即决策树,支持向量机,随机森林和Naïve贝叶斯在UNSW-NB15数据集上的性能。我们使用了包含43个特征的完整UNSW-NB15数据集。实验结果表明,随机森林、决策树和Naïve贝叶斯的准确性比以前报道的由Apache Spark及其MLlib产生的结果有所提高。
{"title":"Network Intrusion Detection using Machine Learning Approaches","authors":"Zakir Hossain, Md. Mahmudur Rahman Sourov, Musharrat Khan, Parves Rahman","doi":"10.1109/I-SMAC52330.2021.9640949","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640949","url":null,"abstract":"At present network intrusion is regarded as a great threat in network usage and communication. Network intrusion detection system detects and prevents anomalous activities or attacks in networks. Many classifiers are used to detect network attacks. In this paper, we have evaluated the performance of four popular classifiers, namely, Decision Tree, Support Vector Machine, Random Forest and Naïve Bayes on UNSW-NB15 dataset using Python language along with its Pandas and SKlearn libraries. We have used the complete UNSW-NB15 dataset with 43 features. Experimental results have shown improvement of accuracy for Random Forest, Decision Tree and Naïve Bayes over previously reported results produced by Apache Spark and its MLlib.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134571525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Encryption Algorithm for Long-Distance Data Transmission in the Internet of Things Based on Channel Nonlinear Transformation 基于信道非线性变换的物联网远距离数据传输加密算法
Ang Li, Chen Zhang, Lei Li
Communication and information transmission can be seen everywhere in people's lives, and its safety is extremely important. In order to further improve the security of data transmission in communication, in addition to adopting traditional source encryption codes, it is also very necessary to increase channel encryption measures. This thesis focuses on channel encryption, introduces and analyzes the encryption algorithm for long-distance data transmission in the Internet of Things based on channel nonlinear transformation. At the same time, in order to verify the feasibility, reliability and confidentiality of the above-mentioned channel encryption method, a verification communication system was designed.
通信和信息传递在人们的生活中随处可见,其安全极为重要。为了进一步提高通信中数据传输的安全性,除了采用传统的源加密码外,增加信道加密措施也是非常必要的。本文以信道加密为研究重点,介绍并分析了基于信道非线性变换的物联网远距离数据传输加密算法。同时,为了验证上述信道加密方法的可行性、可靠性和保密性,设计了验证通信系统。
{"title":"An Encryption Algorithm for Long-Distance Data Transmission in the Internet of Things Based on Channel Nonlinear Transformation","authors":"Ang Li, Chen Zhang, Lei Li","doi":"10.1109/I-SMAC52330.2021.9640784","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640784","url":null,"abstract":"Communication and information transmission can be seen everywhere in people's lives, and its safety is extremely important. In order to further improve the security of data transmission in communication, in addition to adopting traditional source encryption codes, it is also very necessary to increase channel encryption measures. This thesis focuses on channel encryption, introduces and analyzes the encryption algorithm for long-distance data transmission in the Internet of Things based on channel nonlinear transformation. At the same time, in order to verify the feasibility, reliability and confidentiality of the above-mentioned channel encryption method, a verification communication system was designed.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Construction System of E-Commerce Training Base Based on Logistics Path Visualization 基于物流路径可视化的电子商务实训基地智能建设系统
Shuai Shen
With the progress of the country and the development of Internet information technology, my country's e-commerce has achieved leapfrog development. On the one hand, it has strengthened the driving force of my country's economic development and promoted the sound and rapid development of the national economy. The entire training center can implement a series of business operation skills training from uploading, selling, outgoing, after-sales and related logistics of e-commerce products, and at the same time can help individuals start their own businesses and promote public employment. This paper studies the intelligent system construction of e-commerce training base based on logistics path visualization technology, and further analyzes the importance of e-commerce training system.
随着国家的进步和互联网信息技术的发展,我国的电子商务实现了跨越式发展。一方面增强了我国经济发展的动力,促进了国民经济又好又快的发展。整个培训中心可以实施从电子商务产品的上传、销售、出货、售后及相关物流等一系列业务操作技能培训,同时可以帮助个人创业,促进公共就业。本文研究了基于物流路径可视化技术的电子商务实训基地智能系统建设,并进一步分析了电子商务实训系统的重要性。
{"title":"Intelligent Construction System of E-Commerce Training Base Based on Logistics Path Visualization","authors":"Shuai Shen","doi":"10.1109/I-SMAC52330.2021.9640942","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640942","url":null,"abstract":"With the progress of the country and the development of Internet information technology, my country's e-commerce has achieved leapfrog development. On the one hand, it has strengthened the driving force of my country's economic development and promoted the sound and rapid development of the national economy. The entire training center can implement a series of business operation skills training from uploading, selling, outgoing, after-sales and related logistics of e-commerce products, and at the same time can help individuals start their own businesses and promote public employment. This paper studies the intelligent system construction of e-commerce training base based on logistics path visualization technology, and further analyzes the importance of e-commerce training system.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114221048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1