首页 > 最新文献

2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
English-Chinese Corpus Information Collection and Quantum Translation Based on Big Data 基于大数据的英汉语料库信息收集与量子翻译
Xiangdong Guo, Caixia He
With the continuous development of Big Data information resources, the resources that people can obtain through the Internet have also increased. At present, there are about 3,000 known languages in the world. Research on machine translation and automatic acquisition of machine translation knowledge has strong practical significance for people to break through language barriers and make use of Internet information. Based on the description of the whole process of bilingual corpus construction, this essay proposes the flexibility of the information change model and quantum translation platform of the English-Chinese corpus based on big data.
随着大数据信息资源的不断发展,人们可以通过互联网获取的资源也越来越多。目前,世界上已知的语言大约有3000种。研究机器翻译和机器翻译知识的自动获取,对于人们突破语言障碍,充分利用互联网信息具有很强的现实意义。本文在描述双语语料库建设全过程的基础上,提出了基于大数据的英汉语料库信息变化模型和量子翻译平台的灵活性。
{"title":"English-Chinese Corpus Information Collection and Quantum Translation Based on Big Data","authors":"Xiangdong Guo, Caixia He","doi":"10.1109/I-SMAC52330.2021.9640782","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640782","url":null,"abstract":"With the continuous development of Big Data information resources, the resources that people can obtain through the Internet have also increased. At present, there are about 3,000 known languages in the world. Research on machine translation and automatic acquisition of machine translation knowledge has strong practical significance for people to break through language barriers and make use of Internet information. Based on the description of the whole process of bilingual corpus construction, this essay proposes the flexibility of the information change model and quantum translation platform of the English-Chinese corpus based on big data.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125631562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Bird Species Using Multistage Training with Transmission Learning 基于传递学习的多阶段训练方法识别鸟类物种
R. K N, Rohitha Pasumarty
Object localization is a computer vision technique to identify real-world objects such as birds, cats, flowers, cars in images or videos. The algorithm is based on a feature extraction and learning algorithm to recognize instances of an object category. Bird’s species are the most amazing creature exist on earth. They are sensitive to changes in the environment and hence acts as bioindicator species. The main aim of this project is to identify bird species from a high-resolution digital image of Himalayan birds which would help beginner bird watchers or general people for identification. The data sets for the identification of birds are provided by Kaggle which consists of 16 species of birds. For the reduction of the overfitting problem, a data augmentation process is implemented. The model achieves an accuracy of 50.64 or 0.5064% on the dataset of Kaggle.
物体定位是一种计算机视觉技术,用于识别图像或视频中的鸟、猫、花、汽车等现实世界的物体。该算法基于特征提取和学习算法来识别对象类别的实例。鸟类是地球上最神奇的生物。它们对环境变化很敏感,因此是生物指示物种。该项目的主要目的是通过喜马拉雅鸟类的高分辨率数字图像来识别鸟类种类,这将有助于初学者或一般人识别鸟类。鸟类鉴定的数据集由Kaggle提供,该数据集包含16种鸟类。为了减少过拟合问题,实现了数据增强过程。该模型在Kaggle数据集上的准确率为50.64或0.5064%。
{"title":"Recognition of Bird Species Using Multistage Training with Transmission Learning","authors":"R. K N, Rohitha Pasumarty","doi":"10.1109/I-SMAC52330.2021.9640676","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640676","url":null,"abstract":"Object localization is a computer vision technique to identify real-world objects such as birds, cats, flowers, cars in images or videos. The algorithm is based on a feature extraction and learning algorithm to recognize instances of an object category. Bird’s species are the most amazing creature exist on earth. They are sensitive to changes in the environment and hence acts as bioindicator species. The main aim of this project is to identify bird species from a high-resolution digital image of Himalayan birds which would help beginner bird watchers or general people for identification. The data sets for the identification of birds are provided by Kaggle which consists of 16 species of birds. For the reduction of the overfitting problem, a data augmentation process is implemented. The model achieves an accuracy of 50.64 or 0.5064% on the dataset of Kaggle.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Automated Voice Controlled Car Using Arduino with Camera 使用Arduino带摄像头的自动语音控制汽车
C. Thirumarai Selvi, N. Anishviswa, G. A. Karthi, K. Darshan, M. G. Balaji
This paper focuses on voice controlled car with camera, which is constructed by using major components called Arduino Uno, bluetooth module, motor driver circuit, camera and microsd card module. This automation provides a convenient way to control voice-controlled robot. This automation can aid people, who cannot walk. Voice Controlled car is controlled by using specific commands, which are recognized by mike with the mobile application. The mobile application recognize six commands and they are LEFT, RIGHT, FORWARD, BACK, STOP, KEEP WATCH IN ALL DIRECTION. This mobile application can be used in android or IOS cellphones. Here, the Bluetooth module is used for controlling the voice-controlled car wirelessly and utilizes MicroSD card for storing the video from the camera.
本文主要研究带摄像头的语音控制汽车,该汽车主要由Arduino Uno、蓝牙模块、电机驱动电路、摄像头和microsd卡模块组成。这种自动化为语音控制机器人提供了一种方便的控制方式。这种自动化可以帮助那些不能走路的人。语音控制汽车是通过使用特定的命令来控制的,这些命令由麦克风通过移动应用程序识别。移动应用程序识别六个命令,他们是左,右,前进,后退,停止,保持监视所有方向。这个移动应用程序可以在安卓或IOS手机上使用。在这里,蓝牙模块用于无线控制语音控制汽车,并利用MicroSD卡存储来自摄像头的视频。
{"title":"Automated Voice Controlled Car Using Arduino with Camera","authors":"C. Thirumarai Selvi, N. Anishviswa, G. A. Karthi, K. Darshan, M. G. Balaji","doi":"10.1109/I-SMAC52330.2021.9640688","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640688","url":null,"abstract":"This paper focuses on voice controlled car with camera, which is constructed by using major components called Arduino Uno, bluetooth module, motor driver circuit, camera and microsd card module. This automation provides a convenient way to control voice-controlled robot. This automation can aid people, who cannot walk. Voice Controlled car is controlled by using specific commands, which are recognized by mike with the mobile application. The mobile application recognize six commands and they are LEFT, RIGHT, FORWARD, BACK, STOP, KEEP WATCH IN ALL DIRECTION. This mobile application can be used in android or IOS cellphones. Here, the Bluetooth module is used for controlling the voice-controlled car wirelessly and utilizes MicroSD card for storing the video from the camera.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132840158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-time Feedback System of Funding Data Flow Based on Data Tracking and Classification 基于数据跟踪与分类的资金数据流实时反馈系统
Ruizhu Xi, Bencai Gao, Xiao Xia
Data analysis and clustering technologies have becoming the state-of-the-art method of analyzing the complex information. Hence, this paper studies the real-time feedback system of the funding data flow based on the data tracking and classification. The existing research work pays little attention to the secure deletion of private data in mobile cloud, especially the secure deletion of payment information and sensitive private messages generated by mobile cloud and mobile terminal, which is not recoverable, hence, the model is implemented with the optimization of data tracking framework and the classification. After building the model, this research wrk applies it into the funding data flow tracking and monitoring, as well as considering the real-time requirement. The proposed system has been tested on various data sets and the convincing results are achieved.
数据分析和聚类技术已经成为分析复杂信息的最先进的方法。因此,本文研究了基于数据跟踪和分类的资金数据流实时反馈系统。现有的研究工作很少关注移动云中私有数据的安全删除问题,特别是移动云和移动终端产生的支付信息和敏感私信的安全删除问题,这些信息是不可恢复的,因此,通过优化数据跟踪框架和分类来实现模型。在建立模型后,本研究将其应用于资金数据流跟踪与监控中,并考虑实时性要求。该系统在不同的数据集上进行了测试,取得了令人信服的结果。
{"title":"Real-time Feedback System of Funding Data Flow Based on Data Tracking and Classification","authors":"Ruizhu Xi, Bencai Gao, Xiao Xia","doi":"10.1109/I-SMAC52330.2021.9640661","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640661","url":null,"abstract":"Data analysis and clustering technologies have becoming the state-of-the-art method of analyzing the complex information. Hence, this paper studies the real-time feedback system of the funding data flow based on the data tracking and classification. The existing research work pays little attention to the secure deletion of private data in mobile cloud, especially the secure deletion of payment information and sensitive private messages generated by mobile cloud and mobile terminal, which is not recoverable, hence, the model is implemented with the optimization of data tracking framework and the classification. After building the model, this research wrk applies it into the funding data flow tracking and monitoring, as well as considering the real-time requirement. The proposed system has been tested on various data sets and the convincing results are achieved.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Analysis of Genetic Diseases Using Machine Learning Techniques 利用机器学习技术分析遗传病的研究综述
B. Dhanalaxmi, K. Anirudh, G. Nikhitha, R. Jyothi
The approach of new technological developments in the genetic disease repository has facilitated genetic disease treatment. In the post-genomic time gene detection, which causes genetically excessive diseases, is one of the greatest deterrent tasks. Complex diseases are frequently very heterogeneous and make biological markers difficult to identify. Markers commonly depend on the Machine Learning Algorithms to define, but their success completely depends on the quality and dimensions of the data present. In the machine learning area, computers are promised to support people and analyze large and complex data systems primarily for the production of practically enhanced algorithms. A supervised machine learning methodology has been developed to predict complex genes that cause disease and experiment with the developed algorithm to improve and identify genetic classifications that engage in complex diseases. Genetic Disease Analyzer (GDA) was de veloped using machine learning using the Principal Component Analysis (PCA), Random forest, Naive Bayes and Decision Tree algorithms and the results were compared. The accuracy of 98.79% and sensitivity of 98.67% for the GEO data set is provided for the GDA model. The results of machine learning approaches were examined and their practical applications were discussed in the study of genetic and genomic data.
遗传疾病储存库的新技术发展促进了遗传疾病的治疗。在后基因组时代,基因检测是最大的威慑任务之一,它会导致遗传过度疾病。复杂的疾病往往是非常异质的,使生物标记难以识别。标记通常依赖于机器学习算法来定义,但它们的成功完全取决于当前数据的质量和维度。在机器学习领域,计算机被承诺支持人们并分析大型复杂的数据系统,主要是为了产生实际增强的算法。一种有监督的机器学习方法已经开发出来,用于预测导致疾病的复杂基因,并对开发的算法进行实验,以改进和识别导致复杂疾病的遗传分类。遗传疾病分析仪(GDA)采用主成分分析(PCA)、随机森林、朴素贝叶斯和决策树算法进行机器学习开发,并对结果进行比较。GDA模型对GEO数据集的精度为98.79%,灵敏度为98.67%。研究了机器学习方法的结果,并讨论了它们在遗传和基因组数据研究中的实际应用。
{"title":"A Survey on Analysis of Genetic Diseases Using Machine Learning Techniques","authors":"B. Dhanalaxmi, K. Anirudh, G. Nikhitha, R. Jyothi","doi":"10.1109/I-SMAC52330.2021.9640723","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640723","url":null,"abstract":"The approach of new technological developments in the genetic disease repository has facilitated genetic disease treatment. In the post-genomic time gene detection, which causes genetically excessive diseases, is one of the greatest deterrent tasks. Complex diseases are frequently very heterogeneous and make biological markers difficult to identify. Markers commonly depend on the Machine Learning Algorithms to define, but their success completely depends on the quality and dimensions of the data present. In the machine learning area, computers are promised to support people and analyze large and complex data systems primarily for the production of practically enhanced algorithms. A supervised machine learning methodology has been developed to predict complex genes that cause disease and experiment with the developed algorithm to improve and identify genetic classifications that engage in complex diseases. Genetic Disease Analyzer (GDA) was de veloped using machine learning using the Principal Component Analysis (PCA), Random forest, Naive Bayes and Decision Tree algorithms and the results were compared. The accuracy of 98.79% and sensitivity of 98.67% for the GEO data set is provided for the GDA model. The results of machine learning approaches were examined and their practical applications were discussed in the study of genetic and genomic data.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117302548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Encryption Algorithm for Long-Distance Data Transmission in the Internet of Things Based on Channel Nonlinear Transformation 基于信道非线性变换的物联网远距离数据传输加密算法
Ang Li, Chen Zhang, Lei Li
Communication and information transmission can be seen everywhere in people's lives, and its safety is extremely important. In order to further improve the security of data transmission in communication, in addition to adopting traditional source encryption codes, it is also very necessary to increase channel encryption measures. This thesis focuses on channel encryption, introduces and analyzes the encryption algorithm for long-distance data transmission in the Internet of Things based on channel nonlinear transformation. At the same time, in order to verify the feasibility, reliability and confidentiality of the above-mentioned channel encryption method, a verification communication system was designed.
通信和信息传递在人们的生活中随处可见,其安全极为重要。为了进一步提高通信中数据传输的安全性,除了采用传统的源加密码外,增加信道加密措施也是非常必要的。本文以信道加密为研究重点,介绍并分析了基于信道非线性变换的物联网远距离数据传输加密算法。同时,为了验证上述信道加密方法的可行性、可靠性和保密性,设计了验证通信系统。
{"title":"An Encryption Algorithm for Long-Distance Data Transmission in the Internet of Things Based on Channel Nonlinear Transformation","authors":"Ang Li, Chen Zhang, Lei Li","doi":"10.1109/I-SMAC52330.2021.9640784","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640784","url":null,"abstract":"Communication and information transmission can be seen everywhere in people's lives, and its safety is extremely important. In order to further improve the security of data transmission in communication, in addition to adopting traditional source encryption codes, it is also very necessary to increase channel encryption measures. This thesis focuses on channel encryption, introduces and analyzes the encryption algorithm for long-distance data transmission in the Internet of Things based on channel nonlinear transformation. At the same time, in order to verify the feasibility, reliability and confidentiality of the above-mentioned channel encryption method, a verification communication system was designed.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Load flow analysis for Active Islanding Mode 主动孤岛模式下的电力潮流分析
Keshav Kumar, Anil Kumar Kori
For problem of load flow and power flow analysis is variable stability index. Also, arrangement of different bus system and fault tolerance occurrence across the load. In this case, resolution of power quality and improvement of power distribution performance apply islanding protection method. This paper is resenting result and simulation section arrangement of 9 bus system and Reducing Fault effects.
对于负荷潮流和潮流问题,采用变稳定指标进行分析。不同母线系统的布置和跨负载容错。在这种情况下,解决电能质量和改善配电性能采用孤岛保护方法。本文介绍了9母线系统的仿真结果和仿真段布置,减少了故障的影响。
{"title":"Power Load flow analysis for Active Islanding Mode","authors":"Keshav Kumar, Anil Kumar Kori","doi":"10.1109/I-SMAC52330.2021.9640725","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640725","url":null,"abstract":"For problem of load flow and power flow analysis is variable stability index. Also, arrangement of different bus system and fault tolerance occurrence across the load. In this case, resolution of power quality and improvement of power distribution performance apply islanding protection method. This paper is resenting result and simulation section arrangement of 9 bus system and Reducing Fault effects.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"64 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using QRE-based Game Model for better IDS 使用基于qre的游戏模型创造更好的IDS
M. J. Kumar, B. Rao, N. Sai, S. S. Kumar
WSN is a large-scale ad hoc network with the property of sufficient accessibility, including the all extents of correspondence applications, similar to medical care, home computerization, far off perceptions, snags recognition, and so forth WSN comprises of gigantic measure of small actuators, situated on better places which have minimal expense and simple establishment with limitations of restricted energy assets, computational limit and memory size. WSN is presented to numerous security dangers because of its restrictions, broadcast nature and unattended climate. Numerous distributions have proposed various IDS plans to effectively safeguard WSNs against security dangers. To conquer this issue, the proposed paper examines distinctive proposed IDS systems and analyzes them to survey the effectiveness from their qualities and shortcomings. In this paper, obstruction affirmation structure is masterminded and executed utilizing game hypothesis and AI to perceive various assaults. Game theory is organized and used to apply the IDS ideally in WSN. The game model is organized by depicting the players and the differentiating frameworks. QRE considered game hypothesis is utilized to pick the systems in ideal manner for the impedance's region. Further, these obstructions are assigned disavowing of association assault, rank assault or express sending assaults utilizing oversaw AI procedure subject as far as possible and rules. Results show that the entirety of the assaults are seen with commendable region rate and the proposed approach gives ideal utilization of IDS
WSN是一种大规模的自组织网络,具有足够的可访问性,包括通信应用的所有范围,如医疗保健,家庭计算机化,远程感知,障碍识别等。WSN由大量的小型执行器组成,这些执行器位于较好的地方,费用最低,设置简单,受限于有限的能源资产,计算限制和内存大小。无线传感器网络由于其自身的局限性、广播性和无人值守的特点,面临着诸多安全隐患。为了有效地保护wsn免受安全威胁,许多发行版都提出了各种IDS方案。为了解决这一问题,本文对不同的IDS系统进行了研究,并从它们的特点和不足来分析它们的有效性。本文利用博弈假设和人工智能感知各种攻击,构思并执行障碍确认结构。通过博弈论的组织和应用,将IDS理想地应用于WSN中。游戏模型是通过描述参与者和区分框架来组织的。利用QRE考虑博弈假设,以理想的方式选择阻抗区域的系统。此外,这些障碍被分配为否认关联攻击,等级攻击或表达发送攻击,尽可能利用监督人工智能程序主题和规则。结果表明,该方法对入侵检测系统的整体利用率较高,具有良好的区域利用率
{"title":"Using QRE-based Game Model for better IDS","authors":"M. J. Kumar, B. Rao, N. Sai, S. S. Kumar","doi":"10.1109/I-SMAC52330.2021.9641035","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9641035","url":null,"abstract":"WSN is a large-scale ad hoc network with the property of sufficient accessibility, including the all extents of correspondence applications, similar to medical care, home computerization, far off perceptions, snags recognition, and so forth WSN comprises of gigantic measure of small actuators, situated on better places which have minimal expense and simple establishment with limitations of restricted energy assets, computational limit and memory size. WSN is presented to numerous security dangers because of its restrictions, broadcast nature and unattended climate. Numerous distributions have proposed various IDS plans to effectively safeguard WSNs against security dangers. To conquer this issue, the proposed paper examines distinctive proposed IDS systems and analyzes them to survey the effectiveness from their qualities and shortcomings. In this paper, obstruction affirmation structure is masterminded and executed utilizing game hypothesis and AI to perceive various assaults. Game theory is organized and used to apply the IDS ideally in WSN. The game model is organized by depicting the players and the differentiating frameworks. QRE considered game hypothesis is utilized to pick the systems in ideal manner for the impedance's region. Further, these obstructions are assigned disavowing of association assault, rank assault or express sending assaults utilizing oversaw AI procedure subject as far as possible and rules. Results show that the entirety of the assaults are seen with commendable region rate and the proposed approach gives ideal utilization of IDS","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real or Fake: An intrinsic analysis using supervised machine learning algorithms 真假:使用监督机器学习算法进行内在分析
Ameyaa Biwalkar, Ashwini Rao, K. Shah
Different platforms of information data semantics are affected by Fake news in the recent years. Due to the inherent writing style and propagation speed of such false information, it has been difficult to pinpoint them from the true ones. The related work in the field makes use of various supervised as well as unsupervised machine-learning algorithms to classify and detect fake news. This paper provides an in-depth overview of the algorithms that are being used for detection. The paper also provides an analysis of notable algorithms on two datasets: Source based Fake News classification and Fake and Real News dataset. The results show that supervised algorithms with proper embedding and vectorizer models can provide great accuracies. The experimentation output shows the effectiveness of the proposed architecture.
近年来,不同的信息数据语义平台受到假新闻的影响。由于这些虚假信息固有的写作风格和传播速度,很难将其与真实信息区分开来。该领域的相关工作利用各种有监督和无监督的机器学习算法来分类和检测假新闻。本文提供了用于检测的算法的深入概述。本文还分析了两个数据集上的著名算法:基于来源的假新闻分类和假新闻和真实新闻数据集。结果表明,采用适当的嵌入和矢量化模型的监督算法可以提供较高的精度。实验结果表明了该结构的有效性。
{"title":"Real or Fake: An intrinsic analysis using supervised machine learning algorithms","authors":"Ameyaa Biwalkar, Ashwini Rao, K. Shah","doi":"10.1109/I-SMAC52330.2021.9640675","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640675","url":null,"abstract":"Different platforms of information data semantics are affected by Fake news in the recent years. Due to the inherent writing style and propagation speed of such false information, it has been difficult to pinpoint them from the true ones. The related work in the field makes use of various supervised as well as unsupervised machine-learning algorithms to classify and detect fake news. This paper provides an in-depth overview of the algorithms that are being used for detection. The paper also provides an analysis of notable algorithms on two datasets: Source based Fake News classification and Fake and Real News dataset. The results show that supervised algorithms with proper embedding and vectorizer models can provide great accuracies. The experimentation output shows the effectiveness of the proposed architecture.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123535390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Machine Learning Classifier for DTN Routing DTN路由机器学习分类器的实现
J. George, R. Santhosh
This paper presents, better routing method in Delay Tolerant Network using Machine learning. Delay Tolerant Network is a wireless network, in which nodes are changing its positions dynamically in an unexpected way due to that Round trip time and error rates are very high. Examples are Disaster area, under the sea, Space communication, etc. In the proposed method neighbouring nodes are predicted by machine learning classifiers. These nodes use message history delivery information to deliver the message on destination. With the help of Bundle protocol implementation IBR-DTN [3], collects network traffic status and real-world location trace. These information uses to emulate DTN environment by Common Open Research Emulator (CORE) [2]. The new application is used to predict the results, preparation for the network history data, analysis and classification-based routing.
本文提出了一种基于机器学习的容延迟网络路由算法。容忍延迟网络是一种无线网络,由于节点之间的往返时间和错误率非常高,因此节点之间的位置会以一种意想不到的方式动态变化。例如灾区、海底、空间通信等。在该方法中,通过机器学习分类器预测相邻节点。这些节点使用消息历史传递信息在目的地传递消息。借助Bundle协议实现IBR-DTN[3],采集网络流量状态和真实世界位置轨迹。这些信息被通用开放研究仿真器(Common Open Research Emulator, CORE)用来模拟DTN环境[2]。新的应用程序用于预测结果、准备网络历史数据、分析和分类路由。
{"title":"Implementation of Machine Learning Classifier for DTN Routing","authors":"J. George, R. Santhosh","doi":"10.1109/I-SMAC52330.2021.9640863","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640863","url":null,"abstract":"This paper presents, better routing method in Delay Tolerant Network using Machine learning. Delay Tolerant Network is a wireless network, in which nodes are changing its positions dynamically in an unexpected way due to that Round trip time and error rates are very high. Examples are Disaster area, under the sea, Space communication, etc. In the proposed method neighbouring nodes are predicted by machine learning classifiers. These nodes use message history delivery information to deliver the message on destination. With the help of Bundle protocol implementation IBR-DTN [3], collects network traffic status and real-world location trace. These information uses to emulate DTN environment by Common Open Research Emulator (CORE) [2]. The new application is used to predict the results, preparation for the network history data, analysis and classification-based routing.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1