首页 > 最新文献

International Journal of Information Technology, Research and Applications最新文献

英文 中文
SMART IDENTIFICATION AND NOTIFICATION OF DRUGS IN MEDICAL PHARMACY USING IOT 基于物联网的医疗药房药品智能识别与通知
Pub Date : 2023-06-22 DOI: 10.59461/ijitra.v2i2.47
Jawaher Al Washahi, Mithaq Ibrahim Al Qartubi, Jawaher Hamed Al-Hakmani
We did not realize as human beings that the devices around us can communicate with us and communicate with them this is called the Internet of Things(IoT). The IoT is multiple physical objects that communicate using the internet, allowing sending and receiving of data. IoT has its uses that expand to all areas of life, right from waking a person from sleep to putting them back to sleep. IoT has a lot of uses in the field of medicine. Every manufactured medicine is effective only for a particular duration that is already mentioned while we purchase. Medicine that a patient uses becomes fatal when consumed after the date of expiry. The pharmacist often needs more time to make sure that each package of the medication is effective and not expired. Mistakes may occur because of improper storage of the drugs, not checking the expiration date of the medicine, which leads to the distribution of expired medicines to consumers, which leads to many problems. The chemical composition of the drug may change instead of being lifesaving, turn into a deadly poison. Our study aim is to create an IoT device that Contributes to identifying the dispensing of expired medicines by showing notices that alert the pharmacist that the medicine is ineffective, and thus may increase the verification in a short time for the pharmacist and will contribute to improving the reputation of the pharmacy.
作为人类,我们没有意识到我们周围的设备可以与我们沟通,并与他们沟通,这就是所谓的物联网(IoT)。物联网是使用互联网进行通信的多个物理对象,允许发送和接收数据。物联网的用途扩展到生活的各个领域,从唤醒一个人从睡眠到让他们重新入睡。物联网在医学领域有很多用途。每一种制造出来的药物只在我们购买时已经提到的特定时间内有效。病人使用的药物在过期后再食用会致命。药剂师通常需要更多的时间来确保每包药物都是有效的,没有过期。由于药品储存不当,不检查药品的有效期,可能会出现错误,导致过期药品分发给消费者,从而导致许多问题。药物的化学成分可能会改变,而不是挽救生命,变成致命的毒药。我们的研究目标是创建一种物联网设备,通过显示通知提醒药剂师药物无效,有助于识别过期药物的配药,从而可以在短时间内增加药剂师的验证,并有助于提高药房的声誉。
{"title":"SMART IDENTIFICATION AND NOTIFICATION OF DRUGS IN MEDICAL PHARMACY USING IOT","authors":"Jawaher Al Washahi, Mithaq Ibrahim Al Qartubi, Jawaher Hamed Al-Hakmani","doi":"10.59461/ijitra.v2i2.47","DOIUrl":"https://doi.org/10.59461/ijitra.v2i2.47","url":null,"abstract":"We did not realize as human beings that the devices around us can communicate with us and communicate with them this is called the Internet of Things(IoT). The IoT is multiple physical objects that communicate using the internet, allowing sending and receiving of data. \u0000IoT has its uses that expand to all areas of life, right from waking a person from sleep to putting them back to sleep. IoT has a lot of uses in the field of medicine. Every manufactured medicine is effective only for a particular duration that is already mentioned while we purchase. Medicine that a patient uses becomes fatal when consumed after the date of expiry. \u0000The pharmacist often needs more time to make sure that each package of the medication is effective and not expired. Mistakes may occur because of improper storage of the drugs, not checking the expiration date of the medicine, which leads to the distribution of expired medicines to consumers, which leads to many problems. The chemical composition of the drug may change instead of being lifesaving, turn into a deadly poison. \u0000Our study aim is to create an IoT device that Contributes to identifying the dispensing of expired medicines by showing notices that alert the pharmacist that the medicine is ineffective, and thus may increase the verification in a short time for the pharmacist and will contribute to improving the reputation of the pharmacy.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Exploration on Big Data Analysis in Adolescent Diabetic Prediction with Deep Learning Techniques 深度学习技术在青少年糖尿病预测大数据分析中的高效探索
Pub Date : 2023-06-22 DOI: 10.59461/ijitra.v2i2.51
K.MANOHARI
The foundation of big data analysis is a massive volume of data. Diabetes is caused by an excess of sugar collected in the blood. Diabetes is one of the most serious chronic health issues. Diabetes sufferers' eyes, hearts, kidneys, and nerves may be damaged if they go undiagnosed. Humans can benefit from automated technologies to assist them in managing their hectic schedules. It inspires us to create a diabetes management scheme for patients that uses an IoT device to track their blood sugar, blood pressure, sports activities, nutrition plan, oxygen level, and ECG data. Machine learning has risen to prominence in healthcare services (HCS) due to its potential to enhance disease prediction. AI and ML approaches have already been used in the HCS field. We give a complete review of DL applications in diabetes in this study. We did a thorough literature review as well as discovered three key areas where this method is used: diabetes diagnosis, glucose control, and diabetes-related complication diagnosis. The search yielded 40 original research articles, from which we summarised essential data on used learning methods, development methods, main outcomes, and performance evaluation baseline techniques. According to the Reviewed Literature, various DL techniques and frameworks attained state-of-the-art performance in many diabetes-related tasks by outperforming conventional ML methods.
大数据分析的基础是海量的数据。糖尿病是由血液中收集的糖分过多引起的。糖尿病是最严重的慢性健康问题之一。如果不及时诊断,糖尿病患者的眼睛、心脏、肾脏和神经都可能受到损害。人类可以从自动化技术中受益,帮助他们管理繁忙的日程安排。它激励我们为患者创建一个糖尿病管理方案,使用物联网设备来跟踪他们的血糖、血压、运动活动、营养计划、氧气水平和心电图数据。机器学习因其增强疾病预测的潜力而在医疗保健服务(HCS)中日益突出。人工智能和机器学习方法已经在HCS领域得到了应用。在本研究中,我们对DL在糖尿病中的应用进行了全面的综述。我们进行了全面的文献回顾,并发现了该方法应用的三个关键领域:糖尿病诊断、血糖控制和糖尿病相关并发症诊断。搜索产生了40篇原创研究文章,从中我们总结了使用的学习方法、开发方法、主要结果和绩效评估基线技术的基本数据。根据文献综述,各种深度学习技术和框架通过优于传统的机器学习方法,在许多与糖尿病相关的任务中获得了最先进的性能。
{"title":"An Efficient Exploration on Big Data Analysis in Adolescent Diabetic Prediction with Deep Learning Techniques","authors":"K.MANOHARI","doi":"10.59461/ijitra.v2i2.51","DOIUrl":"https://doi.org/10.59461/ijitra.v2i2.51","url":null,"abstract":"The foundation of big data analysis is a massive volume of data. Diabetes is caused by an excess of sugar collected in the blood. Diabetes is one of the most serious chronic health issues. Diabetes sufferers' eyes, hearts, kidneys, and nerves may be damaged if they go undiagnosed. Humans can benefit from automated technologies to assist them in managing their hectic schedules. It inspires us to create a diabetes management scheme for patients that uses an IoT device to track their blood sugar, blood pressure, sports activities, nutrition plan, oxygen level, and ECG data. Machine learning has risen to prominence in healthcare services (HCS) due to its potential to enhance disease prediction. AI and ML approaches have already been used in the HCS field. We give a complete review of DL applications in diabetes in this study. We did a thorough literature review as well as discovered three key areas where this method is used: diabetes diagnosis, glucose control, and diabetes-related complication diagnosis. The search yielded 40 original research articles, from which we summarised essential data on used learning methods, development methods, main outcomes, and performance evaluation baseline techniques. According to the Reviewed Literature, various DL techniques and frameworks attained state-of-the-art performance in many diabetes-related tasks by outperforming conventional ML methods.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"75 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion detection system to advance IoT security environment 入侵检测系统提升物联网安全环境
Pub Date : 2023-06-22 DOI: 10.59461/ijitra.v2i2.48
Maha Abullah Al-Dhuhli, Ammar Khamis Al-Mizaini, Miysaa Salim Al-Braiki, Rajesh Natarajan
Nowadays, with the technological improvement, communications with the things become easier. It helps people to live an easier life, live and work smarter as well as take back control of their lives completely. this smart communication is done in an environment that called Internet of Things (IoT) environment. The Internet of Thing is multiple physical objects that communicate using the internet, allowing sending, and receiving of data. Since it’s a data so it's prone to attack in a goal of steal it, change it and so many reasons.  In addition, nowadays hackers are everywhere with so many types.  So, it needs to protect those data and the devices, if Internet of Things devices doesn't have enough security to protect the system from being compromised, then many threats and attacks will occur. If the administrator does not apply strong security and develop a plan for system and device prevention, the Internet of Things environment will be weak, which will make the system and devices prone to attack. Unauthorized access will be prevented if the login system includes a signature matching system. This research aims to analyze the traffic security and analyze threats and risks using IoT devices from intruders by applying an IDS to the IoT environment. when the attacker will try to enter to the traffic or send any packets to any IoT devices, the intrusion detection system will send an alert to the administrator that there's something wrong need to check, the IDS will detect the attacker's name, type and from which device he tries to enter to the system, it will analyze the traffic system, as well as will prevent the devices and data from threats.
如今,随着技术的进步,与事物的交流变得更加容易。它帮助人们更轻松地生活,更聪明地生活和工作,并完全重新掌控自己的生活。这种智能通信是在称为物联网(IoT)环境的环境中完成的。物联网是使用互联网进行通信的多个物理对象,允许发送和接收数据。因为这是一个数据,所以它很容易被攻击,目的是窃取它,改变它,还有很多原因。此外,如今黑客无处不在,种类繁多。因此,它需要保护这些数据和设备,如果物联网设备没有足够的安全性来保护系统不被破坏,那么就会发生许多威胁和攻击。如果管理员不应用强大的安全措施,不制定系统和设备防护方案,物联网环境就会变得薄弱,系统和设备就容易受到攻击。如果登录系统包含签名匹配系统,则可以防止未经授权的访问。本研究旨在通过在物联网环境中应用IDS,分析物联网设备的流量安全性,并分析入侵者使用物联网设备的威胁和风险。当攻击者试图进入流量或向任何物联网设备发送任何数据包时,入侵检测系统将向管理员发送警报,提示有错误需要检查,IDS将检测攻击者的名称,类型以及他试图进入系统的设备,它将分析流量系统,以及将防止设备和数据受到威胁。
{"title":"Intrusion detection system to advance IoT security environment","authors":"Maha Abullah Al-Dhuhli, Ammar Khamis Al-Mizaini, Miysaa Salim Al-Braiki, Rajesh Natarajan","doi":"10.59461/ijitra.v2i2.48","DOIUrl":"https://doi.org/10.59461/ijitra.v2i2.48","url":null,"abstract":"Nowadays, with the technological improvement, communications with the things become easier. It helps people to live an easier life, live and work smarter as well as take back control of their lives completely. this smart communication is done in an environment that called Internet of Things (IoT) environment. The Internet of Thing is multiple physical objects that communicate using the internet, allowing sending, and receiving of data. Since it’s a data so it's prone to attack in a goal of steal it, change it and so many reasons.  In addition, nowadays hackers are everywhere with so many types.  So, it needs to protect those data and the devices, if Internet of Things devices doesn't have enough security to protect the system from being compromised, then many threats and attacks will occur. If the administrator does not apply strong security and develop a plan for system and device prevention, the Internet of Things environment will be weak, which will make the system and devices prone to attack. Unauthorized access will be prevented if the login system includes a signature matching system. This research aims to analyze the traffic security and analyze threats and risks using IoT devices from intruders by applying an IDS to the IoT environment. when the attacker will try to enter to the traffic or send any packets to any IoT devices, the intrusion detection system will send an alert to the administrator that there's something wrong need to check, the IDS will detect the attacker's name, type and from which device he tries to enter to the system, it will analyze the traffic system, as well as will prevent the devices and data from threats.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characteristics and Operations of Complex Fuzzy Graphs 复模糊图的特征与运算
Pub Date : 2023-06-22 DOI: 10.59461/ijitra.v2i2.57
Veeramani Veerapathran, Suresh R.
In this paper, Complex Fuzzy Graph (CFG) analyzed and introduced new concepts in CFG such as Spanning CFG, Complete CFG, path, arc, length, connected, strongest path and weakest path of CFG. We derived some properties of self complementary CFG and defined the operations on direct product, Semi strong product and strong product of CFG. Derived Isomorphic CFG with example is given in this paper. Moreover we introduced density of the graph and balanced complex fuzzy graph.
本文分析并介绍了复杂模糊图中的一些新概念,如:跨越模糊图、完全模糊图、路径、弧、长度、连通模糊图、最强模糊图和最弱模糊图。给出了自互补CFG的一些性质,定义了CFG的直积、半强积和强积的运算。本文给出了推导出的同构CFG,并举例说明。此外,我们还引入了图的密度和平衡复模糊图。
{"title":"Characteristics and Operations of Complex Fuzzy Graphs","authors":"Veeramani Veerapathran, Suresh R.","doi":"10.59461/ijitra.v2i2.57","DOIUrl":"https://doi.org/10.59461/ijitra.v2i2.57","url":null,"abstract":"In this paper, Complex Fuzzy Graph (CFG) analyzed and introduced new concepts in CFG such as Spanning CFG, Complete CFG, path, arc, length, connected, strongest path and weakest path of CFG. We derived some properties of self complementary CFG and defined the operations on direct product, Semi strong product and strong product of CFG. Derived Isomorphic CFG with example is given in this paper. Moreover we introduced density of the graph and balanced complex fuzzy graph.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personal A.I. Desktop Assistant 个人人工智能桌面助手
Pub Date : 2023-06-22 DOI: 10.59461/ijitra.v2i2.58
Mahesh T R
Early As we all know, how life is interlinked with the technology and the use of AI. AI-powered voice assistants have become an integral part of our lives, intertwining technology and daily tasks. A Personal Virtual Assistant allows a user to command or ask questions in the same manner that they would do with another human and are even capable of doing some basic tasks like opening apps, doing Wikipedia searches without opening a browser, playing music etc, with just a voice command. This project presents the development of a personal desktop assistant using Python, aiming to provide convenience, automation, and assistance to users in their computer-related activities. The assistant incorporates features such as voice recognition, natural language processing, and integration with external APIs to enhance its functionality and user experience. The assistant differentiates itself from existing solutions by offering a highly customizable and extensible platform. Users can tailor the assistant's behavior and functionality to their specific needs, while also benefiting from integration with popular tools and services. The user interface is designed to be intuitive and user-friendly, providing a seamless experience for both novice and experienced users. By creating a personal desktop assistant that combines convenience, automation, and personalized features, this project aims to enhance users' productivity and efficiency in their day-to-day computer tasks.  
我们都知道,生活是如何与技术和人工智能的使用联系在一起的。人工智能语音助手已经成为我们生活中不可或缺的一部分,将技术和日常任务交织在一起。个人虚拟助手允许用户以与另一个人相同的方式命令或提问,甚至能够完成一些基本任务,如打开应用程序,在不打开浏览器的情况下进行维基百科搜索,播放音乐等,只需语音命令。本项目介绍了使用Python开发个人桌面助手,旨在为用户的计算机相关活动提供便利、自动化和帮助。该助手集成了语音识别、自然语言处理等功能,并与外部api集成,以增强其功能和用户体验。该助手与现有解决方案的区别在于,它提供了一个高度可定制和可扩展的平台。用户可以根据自己的具体需求定制助手的行为和功能,同时还可以从与流行工具和服务的集成中受益。用户界面设计直观,用户友好,为新手和经验丰富的用户提供无缝体验。通过创建一个集便利性、自动化和个性化功能于一体的个人桌面助手,该项目旨在提高用户在日常计算机任务中的生产力和效率。
{"title":"Personal A.I. Desktop Assistant","authors":"Mahesh T R","doi":"10.59461/ijitra.v2i2.58","DOIUrl":"https://doi.org/10.59461/ijitra.v2i2.58","url":null,"abstract":"\u0000 \u0000 \u0000 \u0000Early As we all know, how life is interlinked with the technology and the use of AI. AI-powered voice assistants have become an integral part of our lives, intertwining technology and daily tasks. A Personal Virtual Assistant allows a user to command or ask questions in the same manner that they would do with another human and are even capable of doing some basic tasks like opening apps, doing Wikipedia searches without opening a browser, playing music etc, with just a voice command. This project presents the development of a personal desktop assistant using Python, aiming to provide convenience, automation, and assistance to users in their computer-related activities. The assistant incorporates features such as voice recognition, natural language processing, and integration with external APIs to enhance its functionality and user experience. \u0000The assistant differentiates itself from existing solutions by offering a highly customizable and extensible platform. Users can tailor the assistant's behavior and functionality to their specific needs, while also benefiting from integration with popular tools and services. The user interface is designed to be intuitive and user-friendly, providing a seamless experience for both novice and experienced users. By creating a personal desktop assistant that combines convenience, automation, and personalized features, this project aims to enhance users' productivity and efficiency in their day-to-day computer tasks. \u0000 \u0000  \u0000 \u0000 \u0000","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129130425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Management in IoT: A Detailed Survey 物联网中的数据管理:详细调查
Pub Date : 2023-06-22 DOI: 10.59461/ijitra.v2i2.49
Jerome Oswald Ebenezer, Calduwel Newton
This paper surveys the current state of data management in the Internet of Things (IoT). It begins by outlining the challenges and opportunities that data management in IoT presents. Firstly, data management deals with the technical challenges and solutions related to data management in IoT, including data acquisition, storage, and integration. The paper concludes with a set of recommendations for the development of effective data management strategies in the context of IoT. Secondly, the requirement of IoT for data management extends offline storage, query processing, and transaction management activities into online-offline communication and storage dual operations, and the idea of data management is broadened. This is accomplished by IPv6, as well as IoT-specific capabilities and protocols including CoAP, HTTP, and WebSocket. Users may track, monitor, and manage devices with Internet of Things (IoT) device management, ensuring that they operate effectively and securely after deployment. Finally, the paper discusses the various applications of IoT based on the concept of data management in IoT. Numerous more objects, including wearables, medical equipment, houses, cities, farms, industries, and workplaces, are being interacted with by billions of sensors. The IoT platforms assist in establishing and maintaining criteria to enhance and preserve data appropriately. The paper concludes with a set of recommendations for the development of effective data management strategies in the context of IoT.  Smart gadgets automate processes so we may save time by controlling the environment. The most valuable data is protected by edge devices for data management, which also lowers bandwidth costs. These also offer excellent performance, data ownership, and cheap maintenance costs.
本文综述了物联网数据管理的现状。首先概述了物联网数据管理带来的挑战和机遇。首先,数据管理涉及物联网中数据管理的技术挑战和解决方案,包括数据采集、存储和集成。本文最后提出了一套在物联网背景下制定有效数据管理策略的建议。其次,物联网对数据管理的要求将线下的存储、查询处理、事务管理等活动扩展为线上线下的通信、存储双重操作,拓宽了数据管理的思路。这是通过IPv6以及物联网特定的功能和协议实现的,包括CoAP、HTTP和WebSocket。通过物联网设备管理,用户可以对设备进行跟踪、监控和管理,确保设备在部署后有效、安全地运行。最后,基于物联网中数据管理的概念,讨论了物联网的各种应用。包括可穿戴设备、医疗设备、房屋、城市、农场、工业和工作场所在内的无数物体正在通过数十亿个传感器进行交互。物联网平台有助于建立和维护标准,以适当地增强和保存数据。本文最后提出了一套在物联网背景下制定有效数据管理策略的建议。智能设备使流程自动化,因此我们可以通过控制环境来节省时间。最有价值的数据由边缘设备保护,用于数据管理,这也降低了带宽成本。它们还提供了出色的性能、数据所有权和低廉的维护成本。
{"title":"Data Management in IoT: A Detailed Survey","authors":"Jerome Oswald Ebenezer, Calduwel Newton","doi":"10.59461/ijitra.v2i2.49","DOIUrl":"https://doi.org/10.59461/ijitra.v2i2.49","url":null,"abstract":"This paper surveys the current state of data management in the Internet of Things (IoT). It begins by outlining the challenges and opportunities that data management in IoT presents. Firstly, data management deals with the technical challenges and solutions related to data management in IoT, including data acquisition, storage, and integration. The paper concludes with a set of recommendations for the development of effective data management strategies in the context of IoT. Secondly, the requirement of IoT for data management extends offline storage, query processing, and transaction management activities into online-offline communication and storage dual operations, and the idea of data management is broadened. This is accomplished by IPv6, as well as IoT-specific capabilities and protocols including CoAP, HTTP, and WebSocket. Users may track, monitor, and manage devices with Internet of Things (IoT) device management, ensuring that they operate effectively and securely after deployment. Finally, the paper discusses the various applications of IoT based on the concept of data management in IoT. Numerous more objects, including wearables, medical equipment, houses, cities, farms, industries, and workplaces, are being interacted with by billions of sensors. The IoT platforms assist in establishing and maintaining criteria to enhance and preserve data appropriately. The paper concludes with a set of recommendations for the development of effective data management strategies in the context of IoT.  Smart gadgets automate processes so we may save time by controlling the environment. The most valuable data is protected by edge devices for data management, which also lowers bandwidth costs. These also offer excellent performance, data ownership, and cheap maintenance costs.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123467240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalized Movie Recommendation System 个性化电影推荐系统
Pub Date : 2023-03-31 DOI: 10.59461/ijitra.v2i1.40
S. H K, K Praghnya Iyer, Himaja K R, Rahisha Pokharel
In the digital world of today, where there is an infinite amount of content to consume, including movies, books, videos, articles, and so on, finding content that appeals to one's tastes has become challenging. On the other hand, providers of digital content want to keep as many people using their service for as long as possible. This is where the recommender system comes into play, where content providers suggest content to users based on their preferences. Web applications that offer a variety of services and automatically suggest some services based on user interest increasingly rely on recommendation systems. Different business services each play a significant role in the success of the current marketing field.The personalize recommendation technique is one of the most valuable tools for providing personalized service on websites. When it comes to e-Commerce's online marketing efforts, this strategy is extremely useful. To build the proposal framework, the cooperative sifting is exceptionally helpful advances in the field of recommender frameworks. The accuracy of recommendation engines is the source of many issues in today's web. Therefore, a variety of strategies are utilized to enhance the recommendation system's diversity and accuracy. When generating recommendations, the fundamental recommender systems typically take one of the following into account: The Content-Based Filtering, which is based on the user's preferences, it describes things, and we use keywords other than the user's profile to show what the user likes and dislikes.To put it another way, CBF algorithms suggest products that people have liked in the past or products that are similar to them. It looks at what you've liked in the past and suggests the best match, Or a collaborative filtering system makes recommendations for items based on how similar users and/or items are measured. The CF system only suggests products that are popular with similar types of users. The development of a movie recommendation system with category-based recommendations, more precise results, increased efficiency, and overcoming the cold start are the goals of this system.
在今天的数字世界里,有无数的内容可供消费,包括电影、书籍、视频、文章等等,找到符合自己口味的内容变得很有挑战性。另一方面,数字内容提供商希望尽可能长时间地让更多的人使用他们的服务。这就是推荐系统发挥作用的地方,内容提供者根据用户的偏好向用户推荐内容。提供各种服务并根据用户兴趣自动推荐某些服务的Web应用程序越来越依赖于推荐系统。不同的业务服务在当前营销领域的成功中都扮演着重要的角色。个性化推荐技术是网站提供个性化服务最有价值的工具之一。当涉及到电子商务的在线营销工作时,这个策略非常有用。为了构建提案框架,合作筛选是推荐框架领域中非常有益的进展。推荐引擎的准确性是当今网络中许多问题的根源。因此,为了提高推荐系统的多样性和准确性,需要采用多种策略。在生成推荐时,基本的推荐系统通常会考虑以下内容之一:基于内容的过滤,它基于用户的偏好,它描述事物,我们使用用户个人资料以外的关键字来显示用户喜欢和不喜欢的内容。换句话说,CBF算法建议人们过去喜欢的产品或与之相似的产品。它会查看你过去喜欢的东西,并提出最佳匹配建议,或者一个协同过滤系统根据用户和/或物品的相似度来推荐物品。CF系统只推荐受同类用户欢迎的产品。该系统的目标是开发一个基于分类的推荐、更精确的结果、提高效率和克服冷启动的电影推荐系统。
{"title":"Personalized Movie Recommendation System","authors":"S. H K, K Praghnya Iyer, Himaja K R, Rahisha Pokharel","doi":"10.59461/ijitra.v2i1.40","DOIUrl":"https://doi.org/10.59461/ijitra.v2i1.40","url":null,"abstract":"In the digital world of today, where there is an infinite amount of content to consume, including movies, books, videos, articles, and so on, finding content that appeals to one's tastes has become challenging. On the other hand, providers of digital content want to keep as many people using their service for as long as possible. This is where the recommender system comes into play, where content providers suggest content to users based on their preferences. Web applications that offer a variety of services and automatically suggest some services based on user interest increasingly rely on recommendation systems. Different business services each play a significant role in the success of the current marketing field.\u0000The personalize recommendation technique is one of the most valuable tools for providing personalized service on websites. When it comes to e-Commerce's online marketing efforts, this strategy is extremely useful. To build the proposal framework, the cooperative sifting is exceptionally helpful advances in the field of recommender frameworks. The accuracy of recommendation engines is the source of many issues in today's web. Therefore, a variety of strategies are utilized to enhance the recommendation system's diversity and accuracy. When generating recommendations, the fundamental recommender systems typically take one of the following into account: The Content-Based Filtering, which is based on the user's preferences, it describes things, and we use keywords other than the user's profile to show what the user likes and dislikes.\u0000To put it another way, CBF algorithms suggest products that people have liked in the past or products that are similar to them. It looks at what you've liked in the past and suggests the best match, Or a collaborative filtering system makes recommendations for items based on how similar users and/or items are measured. The CF system only suggests products that are popular with similar types of users. The development of a movie recommendation system with category-based recommendations, more precise results, increased efficiency, and overcoming the cold start are the goals of this system.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical study of Hybrid Cryptographic Algorithms 混合密码算法的实证研究
Pub Date : 2023-03-31 DOI: 10.59461/ijitra.v2i1.50
Kalvikkarasi, Dr.Saraswathi A
For the last few decades cloud computing is a blooming word in the field of computer science. Cloud computing is a fast growing technology; it provides various services to the user through internet on demand. Now a days, people in busy move, they use Cloud to store and retrieve data at anywhere, any time without use of any physical storage devices like pen drive, compact disc etc . Enormous features of cloud, most of the small and large scale organizations outsource their data in cloud data storage. With the widespread application of cloud, huge amount of users are incorporated in public cloud, it may lead to vulnerable attacks. So security and privacy is an important factor in cloud environment. This security problem can be solved by various ways. Cryptography is one of the techniques to secure user data in cloud. Researchers can use various cryptographic algorithms to implement the security in cloud storage. This paper focuses the summative analysis of researches, in cloud security from 2018-2022. This survey paper provides solution to researchers who have their work in cloud.
在过去的几十年里,云计算是计算机科学领域的一个新兴词汇。云计算是一项快速发展的技术;它通过互联网按需为用户提供各种服务。如今,人们在忙碌的移动中,他们使用云来存储和检索数据在任何地方,任何时间,而不使用任何物理存储设备,如笔驱动器,光盘等。由于云的巨大特性,大多数小型和大型组织都将其数据外包到云数据存储中。随着云的广泛应用,大量用户被纳入公有云,这可能导致易受攻击。因此,安全性和隐私性是云环境中的一个重要因素。这个安全问题可以通过各种方式解决。加密技术是云环境中保护用户数据安全的技术之一。研究人员可以使用各种加密算法来实现云存储中的安全性。本文重点对2018-2022年的云安全研究进行了总结分析。本调查报告为在云上工作的研究人员提供了解决方案。
{"title":"An Empirical study of Hybrid Cryptographic Algorithms","authors":"Kalvikkarasi, Dr.Saraswathi A","doi":"10.59461/ijitra.v2i1.50","DOIUrl":"https://doi.org/10.59461/ijitra.v2i1.50","url":null,"abstract":"For the last few decades cloud computing is a blooming word in the field of computer science. Cloud computing is a fast growing technology; it provides various services to the user through internet on demand. Now a days, people in busy move, they use Cloud to store and retrieve data at anywhere, any time without use of any physical storage devices like pen drive, compact disc etc . Enormous features of cloud, most of the small and large scale organizations outsource their data in cloud data storage. With the widespread application of cloud, huge amount of users are incorporated in public cloud, it may lead to vulnerable attacks. So security and privacy is an important factor in cloud environment. This security problem can be solved by various ways. Cryptography is one of the techniques to secure user data in cloud. Researchers can use various cryptographic algorithms to implement the security in cloud storage. This paper focuses the summative analysis of researches, in cloud security from 2018-2022. This survey paper provides solution to researchers who have their work in cloud.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Early Detection of Cancer using Machine Learning (ML) Techniques 使用机器学习(ML)技术进行癌症早期检测
Pub Date : 2023-03-31 DOI: 10.59461/ijitra.v2i1.24
T. Mahesh, Vinoth Kumar
Early detection of cancer sickness leads to rapid treatment, reducing the risk of morbidity and mortality. The diagnosis of oral cancer continues to be a challenge for dental careers, particularly in the location, evaluation, and review of early-stage oral disease. Due to the lack of optimal analysis using conventional methods, oral cancer is identified and grouped using AI at an early stage. AI techniques are used to show the movement and treatment of dangerous locations and may accurately predict future disease effects. AI techniques are used to show the movement and treatment of dangerous locations and may accurately predict future disease effects. A combination of expert AI and highlight determination calculations produces improved results in the early detection and forecast of oral cancer. The main goal and commitment of this audit study is to summarize the use of AI technologies for accurate early prediction of oral malignant development.
癌症疾病的早期发现导致快速治疗,降低发病率和死亡率的风险。口腔癌的诊断仍然是牙科事业的一个挑战,特别是在早期口腔疾病的定位、评估和审查方面。由于传统方法缺乏最佳分析,因此在早期阶段使用人工智能识别和分组口腔癌。人工智能技术用于显示危险地点的移动和治疗,并可能准确预测未来的疾病影响。人工智能技术用于显示危险地点的移动和治疗,并可能准确预测未来的疾病影响。专家人工智能和重点确定计算的结合在口腔癌的早期检测和预测方面产生了改进的结果。本审计研究的主要目标和承诺是总结人工智能技术在口腔恶性发展的准确早期预测中的应用。
{"title":"Early Detection of Cancer using Machine Learning (ML) Techniques","authors":"T. Mahesh, Vinoth Kumar","doi":"10.59461/ijitra.v2i1.24","DOIUrl":"https://doi.org/10.59461/ijitra.v2i1.24","url":null,"abstract":"Early detection of cancer sickness leads to rapid treatment, reducing the risk of morbidity and mortality. The diagnosis of oral cancer continues to be a challenge for dental careers, particularly in the location, evaluation, and review of early-stage oral disease. Due to the lack of optimal analysis using conventional methods, oral cancer is identified and grouped using AI at an early stage. AI techniques are used to show the movement and treatment of dangerous locations and may accurately predict future disease effects. AI techniques are used to show the movement and treatment of dangerous locations and may accurately predict future disease effects. A combination of expert AI and highlight determination calculations produces improved results in the early detection and forecast of oral cancer. The main goal and commitment of this audit study is to summarize the use of AI technologies for accurate early prediction of oral malignant development.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125319314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Machine Learning-Based Data Mining Techniques for IDS 基于机器学习的IDS数据挖掘技术的实现
Pub Date : 2023-03-31 DOI: 10.59461/ijitra.v2i1.23
Mahesh T R, V Vivek, Vinoth Kumar
The internet is essential for ongoing contact in the modern world, yet its effectiveness might lessen the effect known as intrusions. Any action that negatively affects the targeted system is considered an intrusion. Network security has grown to be a major issue as a result of the Internet's rapid expansion. The Network Intrusion Detection System (IDS), which is widely used, is the primary security defensive mechanism against such hostile assaults. Data mining and machine learning technologies have been extensively employed in network intrusion detection and prevention systems to extract user behaviour patterns from network traffic data. Association rules and sequence rules are the main foundations of data mining used for intrusion detection. Given the Auto encoder algorithm's traditional method's bottleneck of frequent itemsets mining, we provide a Length-Decreasing Support to Identify Intrusion based on Data Mining, which is an upgraded Data Mining Techniques based on Machine Learning for IDS. Based on test results, it appears that the suggested strategy is successful
在现代社会,互联网对于持续的联系是必不可少的,但它的有效性可能会减轻所谓的入侵的影响。任何对目标系统产生负面影响的行为都被认为是入侵。随着互联网的迅速发展,网络安全已成为一个重大问题。网络入侵检测系统(IDS, Network Intrusion Detection System)是防范此类恶意攻击的主要安全防御机制,目前已得到广泛应用。数据挖掘和机器学习技术已广泛应用于网络入侵检测和防御系统中,从网络流量数据中提取用户行为模式。关联规则和序列规则是入侵检测中数据挖掘的主要基础。针对Auto encoder算法传统方法频繁项集挖掘的瓶颈,提出了一种基于数据挖掘的减长支持入侵识别方法,这是IDS基于机器学习的数据挖掘技术的升级版。根据测试结果,建议的策略似乎是成功的
{"title":"Implementation of Machine Learning-Based Data Mining Techniques for IDS","authors":"Mahesh T R, V Vivek, Vinoth Kumar","doi":"10.59461/ijitra.v2i1.23","DOIUrl":"https://doi.org/10.59461/ijitra.v2i1.23","url":null,"abstract":"The internet is essential for ongoing contact in the modern world, yet its effectiveness might lessen the effect known as intrusions. Any action that negatively affects the targeted system is considered an intrusion. Network security has grown to be a major issue as a result of the Internet's rapid expansion. The Network Intrusion Detection System (IDS), which is widely used, is the primary security defensive mechanism against such hostile assaults. Data mining and machine learning technologies have been extensively employed in network intrusion detection and prevention systems to extract user behaviour patterns from network traffic data. Association rules and sequence rules are the main foundations of data mining used for intrusion detection. Given the Auto encoder algorithm's traditional method's bottleneck of frequent itemsets mining, we provide a Length-Decreasing Support to Identify Intrusion based on Data Mining, which is an upgraded Data Mining Techniques based on Machine Learning for IDS. Based on test results, it appears that the suggested strategy is successful","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology, Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1