首页 > 最新文献

International Journal of Engineering and Computer Science最新文献

英文 中文
Addressing Challenges of Opinion Mining in Businesses 解决企业意见挖掘的挑战
Pub Date : 2023-01-01 DOI: 10.18535/ijecs/v12i01.4710
T. Khan
Customer satisfaction has become the primary target for each successful running business currently. They have the true potential in uplifting a tiny business overnight to completely shutting down a brand. Real time analysis of customer opinion (sentiment) is the backbone of this success. Thus this piece of research tries to focus light on the challenges encountered by businesses in four categories of opinion mining. Natural Language Processing with machine learning algorithms works wonders for opinion mining. What is important is the correct choice of opinion mining for a specific type of business as each one of them demands an idiosyncratic approach. The research indeed shares a quick infusion for businesses to safeguard. Countless advice is beared by businesses to have real time analysis, but this research endeavor by showcasing its ideal infusion.
顾客满意已成为当前每个成功经营企业的首要目标。他们有真正的潜力,可以在一夜之间让一家小公司兴旺起来,甚至彻底关闭一个品牌。实时分析客户意见(情绪)是这种成功的支柱。因此,这篇研究试图将重点放在企业在四类意见挖掘中遇到的挑战上。使用机器学习算法的自然语言处理在意见挖掘方面创造了奇迹。重要的是为特定类型的业务正确选择意见挖掘,因为每种类型都需要一种特殊的方法。这项研究确实为企业提供了一种快速的保护方法。企业对实时分析的建议数不胜数,但本研究通过展示其理想的输液来努力。
{"title":"Addressing Challenges of Opinion Mining in Businesses","authors":"T. Khan","doi":"10.18535/ijecs/v12i01.4710","DOIUrl":"https://doi.org/10.18535/ijecs/v12i01.4710","url":null,"abstract":"Customer satisfaction has become the primary target for each successful running business currently. They have the true potential in uplifting a tiny business overnight to completely shutting down a brand. Real time analysis of customer opinion (sentiment) is the backbone of this success. Thus this piece of research tries to focus light on the challenges encountered by businesses in four categories of opinion mining. Natural Language Processing with machine learning algorithms works wonders for opinion mining. What is important is the correct choice of opinion mining for a specific type of business as each one of them demands an idiosyncratic approach. The research indeed shares a quick infusion for businesses to safeguard. Countless advice is beared by businesses to have real time analysis, but this research endeavor by showcasing its ideal infusion.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amazon’s Fake Review Detection using Support Vector Machine 使用支持向量机的亚马逊虚假评论检测
Pub Date : 2022-12-16 DOI: 10.18535/ijecs/v11i12.4708
Om Dhamdhere, Mansi Singh, Abhijeet Dhanwate, Atharva Kumbhar, , Pranali Lokhande
Online user data is crucial to the marketing process since it affects consumers' daily lives. False product reviews have a negative impact on the enterprise's capacity to analyse data and make decisions with confidence. Some users have a propensity todisseminate unconfirmed fake news on internet sites.Today, it is crucial to be able to recognise fake reviews.Many websites provide things for sale to consumers online. Purchasing decisions can be made based on product reviews and market demand. On the basis of reviews, consumers determine whether a product is acceptable for use or not. There will be hundreds of comments about the product, some of which may be false. We provide a mechanism to identify fake reviews of items and indicate whether they are reliable or not in order to distinguish between them. This approach for identifying false reviews describes the use of supervised machine learning. This methodology was devised in response to gaps because traditional fake review detection methods classified reviews as authentic or false using either sentiment polarity scores or categorical datasets. By taking into account both polarity ratings and classifiers for false review identification, our method contributes to closing this gap. A survey of already published articles was conducted as part of our effort. Support Vector Machine[2], a machine learning technique, used in our system produced accuracy of 80%.
在线用户数据对营销过程至关重要,因为它影响到消费者的日常生活。虚假的产品评论会对企业分析数据和自信地做出决策的能力产生负面影响。一些用户有在网站上传播未经证实的假新闻的倾向。如今,识别虚假评论的能力至关重要。许多网站在网上向消费者提供出售的东西。采购决策可以基于产品评论和市场需求。在评论的基础上,消费者决定产品是否可以使用。将会有数百条关于该产品的评论,其中一些可能是虚假的。我们提供了一种机制来识别虚假评论,并指出它们是否可靠,以便区分它们。这种识别错误评论的方法描述了监督机器学习的使用。由于传统的虚假评论检测方法使用情感极性得分或分类数据集将评论分类为真实或虚假,因此设计了这种方法来应对差距。通过考虑极性评级和错误评论识别的分类器,我们的方法有助于缩小这一差距。作为我们工作的一部分,我们对已经发表的文章进行了调查。支持向量机[2],一种机器学习技术,在我们的系统中使用,产生了80%的准确率。
{"title":"Amazon’s Fake Review Detection using Support Vector Machine","authors":"Om Dhamdhere, Mansi Singh, Abhijeet Dhanwate, Atharva Kumbhar, , Pranali Lokhande","doi":"10.18535/ijecs/v11i12.4708","DOIUrl":"https://doi.org/10.18535/ijecs/v11i12.4708","url":null,"abstract":"Online user data is crucial to the marketing process since it affects consumers' daily lives. False product reviews have a negative impact on the enterprise's capacity to analyse data and make decisions with confidence. Some users have a propensity todisseminate unconfirmed fake news on internet sites.Today, it is crucial to be able to recognise fake reviews.Many websites provide things for sale to consumers online. Purchasing decisions can be made based on product reviews and market demand. On the basis of reviews, consumers determine whether a product is acceptable for use or not. There will be hundreds of comments about the product, some of which may be false. We provide a mechanism to identify fake reviews of items and indicate whether they are reliable or not in order to distinguish between them. This approach for identifying false reviews describes the use of supervised machine learning. This methodology was devised in response to gaps because traditional fake review detection methods classified reviews as authentic or false using either sentiment polarity scores or categorical datasets. By taking into account both polarity ratings and classifiers for false review identification, our method contributes to closing this gap. A survey of already published articles was conducted as part of our effort. Support Vector Machine[2], a machine learning technique, used in our system produced accuracy of 80%.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"64 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Examination of the Blockchain Technology: Challenges and Future Opportunities 区块链技术研究:挑战与未来机遇
Pub Date : 2022-11-30 DOI: 10.18535/ijecs/v11i11.4706
A. Hannan
One of the most recent technological developments, block chain technology has the potential to help a lot of organizations. In order to give readers a better understanding of what block chain technology is and how it works, this paper's main goal is to give an overview of it. The questions that should be asked to determine whether Block chain Technology is the best option for organizations are included in another section of this paper. This section will also provide a summary of how Block chain Technology can benefit businesses. The discussion that follows demonstrates how various industries are currently mastering the technology in order to dominate their fields. This essay will also look at the findings of a study that was done to gauge public awareness of block chain technology.
作为最新的技术发展之一,区块链技术有可能帮助许多组织。为了让读者更好地了解区块链技术是什么以及它是如何工作的,本文的主要目标是对它进行概述。确定区块链技术是否是组织的最佳选择应该提出的问题包含在本文的另一部分中。本节还将概述区块链技术如何使企业受益。下面的讨论展示了不同的行业目前是如何掌握这项技术来主导他们的领域的。本文还将研究一项研究的结果,该研究旨在衡量公众对区块链技术的认识。
{"title":"An Examination of the Blockchain Technology: Challenges and Future Opportunities","authors":"A. Hannan","doi":"10.18535/ijecs/v11i11.4706","DOIUrl":"https://doi.org/10.18535/ijecs/v11i11.4706","url":null,"abstract":"One of the most recent technological developments, block chain technology has the potential to help a lot of organizations. In order to give readers a better understanding of what block chain technology is and how it works, this paper's main goal is to give an overview of it. The questions that should be asked to determine whether Block chain Technology is the best option for organizations are included in another section of this paper. This section will also provide a summary of how Block chain Technology can benefit businesses. The discussion that follows demonstrates how various industries are currently mastering the technology in order to dominate their fields. This essay will also look at the findings of a study that was done to gauge public awareness of block chain technology.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Miniaturized helical antenna design for network with LoRa technology 基于LoRa技术的网络小型化螺旋天线设计
Pub Date : 2022-11-22 DOI: 10.18535/ijecs/v11i11.4701
Carlos Soria, Víctor Rangel R, M. Edwards
This article presents the analysis, design and optimization of a normal radiation helical antenna with medium gain (2dB) and circular polarization as a proposal for use in a network with LoRa technology. The diameter of this antenna for the UHF frequency band would be 10.5cm, for which a parametric study is carried out to miniaturize the dimensions of the helix without losing its characteristics. The parameters and simulation results for a frequency of 915 MHz are presented.
本文分析、设计和优化了一种中增益圆极化法向辐射螺旋天线,作为LoRa网络的一种应用方案。该天线在UHF频段的直径为10.5cm,为此进行了参数化研究,以在不失去其特性的情况下缩小螺旋的尺寸。给出了915mhz频率下的参数和仿真结果。
{"title":"Miniaturized helical antenna design for network with LoRa technology","authors":"Carlos Soria, Víctor Rangel R, M. Edwards","doi":"10.18535/ijecs/v11i11.4701","DOIUrl":"https://doi.org/10.18535/ijecs/v11i11.4701","url":null,"abstract":"This article presents the analysis, design and optimization of a normal radiation helical antenna with medium gain (2dB) and circular polarization as a proposal for use in a network with LoRa technology. The diameter of this antenna for the UHF frequency band would be 10.5cm, for which a parametric study is carried out to miniaturize the dimensions of the helix without losing its characteristics. The parameters and simulation results for a frequency of 915 MHz are presented.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Helicoidal antenna in RIVERcore device for the Emergency Water Information Network 应急水信息网RIVERcore装置中的螺旋天线
Pub Date : 2022-09-22 DOI: 10.18535/ijecs/v11i09.4699
Carlos Soria, Víctor Rangel R, R. Edwards
This article presents the analysis, design, simulation, construction and characterization of an axial radiation helical antenna with medium gain (11dBi) and circular polarization as a proposed use for the emergency water information network. Due to its application in the earth station, there are no dimensional limits. The parameters and results for an operating frequency of 915 MHz are presented.
本文介绍了一种中增益(11dBi)圆极化轴向辐射螺旋天线的分析、设计、仿真、构造和特性,并提出了一种用于应急供水信息网络的天线。由于其应用于地面站,没有尺寸限制。给出了915mhz工作频率下的参数和结果。
{"title":"Helicoidal antenna in RIVERcore device for the Emergency Water Information Network","authors":"Carlos Soria, Víctor Rangel R, R. Edwards","doi":"10.18535/ijecs/v11i09.4699","DOIUrl":"https://doi.org/10.18535/ijecs/v11i09.4699","url":null,"abstract":"This article presents the analysis, design, simulation, construction and characterization of an axial radiation helical antenna with medium gain (11dBi) and circular polarization as a proposed use for the emergency water information network. Due to its application in the earth station, there are no dimensional limits. The parameters and results for an operating frequency of 915 MHz are presented.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123695804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
conversion of flowchart to C program(Source code ) 将流程图转换为 C 程序(源代码)
Pub Date : 2022-09-17 DOI: 10.18535/ijecs/v11i09.4696
Johnson Kannepamula
{"title":"conversion of flowchart to C program(Source code )","authors":"Johnson Kannepamula","doi":"10.18535/ijecs/v11i09.4696","DOIUrl":"https://doi.org/10.18535/ijecs/v11i09.4696","url":null,"abstract":"<jats:p />","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-Neural Networks as feature extractors and monolithic neural networks as classifiers, for classification of uterine cervix cancer cases 以深度神经网络为特征提取器,以整体神经网络为分类器,对宫颈癌病例进行分类
Pub Date : 2022-09-08 DOI: 10.18535/ijecs/v11i09.4656
Mehboob Ali, Vinod Sharma, M. Ali
With the advent of deep neural networks, application of machine learning in multidisciplinary problems enhanced many folds. Many unsolvable problems previously sought as complex to compute are now made solvable by deep neural network techniques. Problems like protein folding by Alpha-fold and Alpha-Go are prime examples. In this study six well known convolutional neural networks are applied for the classification of uterine cervix cancer cases for both seven class and two class classification. A primary dataset was also created by collecting raw slide samples form the leading medical institutes. The machine learning techniques do require set of well-crafted feature values representing the ground truth. Many times, these features fail to represent the ground truth. The deep neural networks can extract all the relevant features itself and those extracted features are used for final classification. In this work the convolutional neural networks are used for extraction of features which are the used for training shallow neural networks. The shallow neural networks used are Levenberg Marquardt neural network, One Step Secant and Scaled Conjugate gradient descent. The results indicated that among the 6 convolutional neural networks the ResNet50 is best and among the three shallow neural network Levenberg Marquardt is best for both seven and two class classification. The duo (ResNet50 and Levenberg Marquardt) produced a classification accuracy of 82.92%. Among all the classes of diagnosis, class 7 has the best F-value followed by class 1, whereas class 4 has the lowest F- value followed by class 5 and class 2. Lowest F-value indicates maximum misclassification. For two-class classification, duo (ResNet50 and Levenberg Marquardt) produced classification accuracy is 94.77%. The F-value of both the classes is above 92% for all the combination of CNN and shallow neural network. The results do conclude that the deep neural networks can easily classify the cases of cervical cancer with notable accuracy, without feature extraction.
随着深度神经网络的出现,机器学习在多学科问题中的应用得到了极大的提升。许多以前难以计算的无法解决的问题现在通过深度神经网络技术可以解决。像alphafold和alphago这样的蛋白质折叠问题就是最好的例子。本研究采用6种常用的卷积神经网络对宫颈癌病例进行7类和2类分类。通过收集来自领先医疗机构的原始幻灯片样本,还创建了一个主要数据集。机器学习技术确实需要一组精心设计的特征值来表示基本事实。很多时候,这些特征并不能代表基本事实。深度神经网络可以自行提取所有相关特征,并将提取的特征用于最终分类。在这项工作中,使用卷积神经网络来提取用于训练浅神经网络的特征。浅层神经网络主要有Levenberg - Marquardt神经网络、一步割线和缩放共轭梯度下降。结果表明,在6个卷积神经网络中,ResNet50是最好的,而在3个浅神经网络中,Levenberg Marquardt在7类和2类分类中都是最好的。二人组(ResNet50和Levenberg Marquardt)的分类准确率为82.92%。在所有诊断类别中,类别7的F值最好,其次是类别1,而类别4的F值最低,其次是类别5和类别2。f值最小表示错误分类最大。对于两类分类,duo (ResNet50和Levenberg Marquardt)得出的分类准确率为94.77%。对于CNN和浅神经网络的所有组合,这两个类的f值都在92%以上。结果表明,深度神经网络可以很容易地对宫颈癌病例进行分类,并且不需要特征提取。
{"title":"Deep-Neural Networks as feature extractors and monolithic neural networks as classifiers, for classification of uterine cervix cancer cases","authors":"Mehboob Ali, Vinod Sharma, M. Ali","doi":"10.18535/ijecs/v11i09.4656","DOIUrl":"https://doi.org/10.18535/ijecs/v11i09.4656","url":null,"abstract":"With the advent of deep neural networks, application of machine learning in multidisciplinary problems enhanced many folds. Many unsolvable problems previously sought as complex to compute are now made solvable by deep neural network techniques. Problems like protein folding by Alpha-fold and Alpha-Go are prime examples. \u0000In this study six well known convolutional neural networks are applied for the classification of uterine cervix cancer cases for both seven class and two class classification. A primary dataset was also created by collecting raw slide samples form the leading medical institutes. The machine learning techniques do require set of well-crafted feature values representing the ground truth. Many times, these features fail to represent the ground truth. The deep neural networks can extract all the relevant features itself and those extracted features are used for final classification. In this work the convolutional neural networks are used for extraction of features which are the used for training shallow neural networks. The shallow neural networks used are Levenberg Marquardt neural network, One Step Secant and Scaled Conjugate gradient descent. The results indicated that among the 6 convolutional neural networks the ResNet50 is best and among the three shallow neural network Levenberg Marquardt is best for both seven and two class classification. The duo (ResNet50 and Levenberg Marquardt) produced a classification accuracy of 82.92%. Among all the classes of diagnosis, class 7 has the best F-value followed by class 1, whereas class 4 has the lowest F- value followed by class 5 and class 2. Lowest F-value indicates maximum misclassification. For two-class classification, duo (ResNet50 and Levenberg Marquardt) produced classification accuracy is 94.77%. The F-value of both the classes is above 92% for all the combination of CNN and shallow neural network. \u0000The results do conclude that the deep neural networks can easily classify the cases of cervical cancer with notable accuracy, without feature extraction.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116048733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Finger Vein Pattern based Key GenerationExchange and Security framework for IoT using ID based cryptography, ECDH and AES 基于手指静脉模式的密钥生成交换和物联网安全框架,使用基于ID的加密,ECDH和AES
Pub Date : 2022-08-29 DOI: 10.18535/ijecs/v11i08.4695
Dnyaneshwari P.Wagh, Fadewar H.S, S. G. N., Santosh P. Shrikhande
Every person has a unique finger vein pattern existing within each finger. Unlike facial features or fingerprints, finger vein authentication systems aren’t vulnerable to forgery. Finger vein authentication systems are more secure and reliable, and less expensive, than biometric security systems using fingerprint. This paper presents a novel security framework based on finger vein pattern. Finger Vein pattern in used in ID based cryptography to generate the keys for data encryption. These keys are combined with generator of Elliptic Curve Cryptography (ECC) to exchange the keys using Diffie Hellman key exchange algorithm. Once the keys are exchanged, the data is encrypted using Advance Encryption Standard (AES). This framework is tested in Internet of Things (IoT) environment for enhancing the security. The IoT based security systems implemented in the banks and other organizations can be enhanced considerably using the proposed security model.
每个人的手指上都有独特的静脉形态。与面部特征或指纹不同,手指静脉认证系统不易被伪造。与使用指纹的生物识别安全系统相比,手指静脉认证系统更安全可靠,而且成本更低。提出了一种基于手指静脉模式的安全框架。手指静脉模式用于基于ID的加密,生成数据加密的密钥。这些密钥与椭圆曲线密码(ECC)生成器结合使用Diffie Hellman密钥交换算法进行密钥交换。一旦交换了密钥,数据就会使用高级加密标准(AES)进行加密。该框架在物联网(IoT)环境中进行了测试,以提高安全性。在银行和其他组织中实施的基于物联网的安全系统可以使用建议的安全模型大大增强。
{"title":"A Finger Vein Pattern based Key GenerationExchange and Security framework for IoT using ID based cryptography, ECDH and AES","authors":"Dnyaneshwari P.Wagh, Fadewar H.S, S. G. N., Santosh P. Shrikhande","doi":"10.18535/ijecs/v11i08.4695","DOIUrl":"https://doi.org/10.18535/ijecs/v11i08.4695","url":null,"abstract":"Every person has a unique finger vein pattern existing within each finger. Unlike facial features or fingerprints, finger vein authentication systems aren’t vulnerable to forgery. Finger vein authentication systems are more secure and reliable, and less expensive, than biometric security systems using fingerprint. This paper presents a novel security framework based on finger vein pattern. Finger Vein pattern in used in ID based cryptography to generate the keys for data encryption. These keys are combined with generator of Elliptic Curve Cryptography (ECC) to exchange the keys using Diffie Hellman key exchange algorithm. Once the keys are exchanged, the data is encrypted using Advance Encryption Standard (AES). This framework is tested in Internet of Things (IoT) environment for enhancing the security. The IoT based security systems implemented in the banks and other organizations can be enhanced considerably using the proposed security model.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132878413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Era of Social Media Analytic Tools: A New Approach 社会媒体分析工具时代:一种新方法
Pub Date : 2022-07-22 DOI: 10.18535/ijecs/v11i07.4682
PAGALLA BHAVANI SHANKAR, P L N PRAKASH KUMAR, Lakshmi Prasanna Pulipaka
Data is a word plays a vital role in every kind of aspects.  In earlier days data can be expressed manually through communication channels. Day by day technology is enhanced in various etiquette. As per trends, technology is directly proportional to the data. Data will be transmitted from source to destination by using communication channel at wide range massively. The massive data is produced at the moment by using social media, as per today’s technology. Data communication will be passing through internet by adopting various kinds of several media platforms (Face book, twitter, snap chat). Raw data is in the form of unstructured where it moves to social media platforms. Unstructured data is unreadable in nature. To overcome this factor Social Media Analytics (SMA) is a weapon to organize the unstructured data into the manner of structured. To perform the analysis on the unstructured data, need to adopt different analytics tools. Among the different analytical tools, Tanagra is the best optimized tool to organized and  analyzed the unstructured data and produces the users concerned data. Keywords: Structured Data, Unstructured Data, Social Media, Social Media Analytics
数据这个词在各个方面都起着至关重要的作用。在早期,数据可以通过通信渠道手工表达。科技在各种礼仪上日益进步。就趋势而言,技术与数据成正比。数据将通过大范围的通信信道大规模地从源传输到目的。根据今天的技术,海量数据是通过使用社交媒体产生的。数据通信将通过互联网通过采用各种媒体平台(facebook, twitter, snap chat)。原始数据以非结构化的形式移动到社交媒体平台。非结构化数据本质上是不可读的。为了克服这一因素,社交媒体分析(SMA)是将非结构化数据组织成结构化方式的武器。要对非结构化数据进行分析,需要采用不同的分析工具。在不同的分析工具中,Tanagra是对非结构化数据进行组织和分析并生成用户关心的数据的最佳优化工具。关键词:结构化数据,非结构化数据,社交媒体,社交媒体分析
{"title":"Era of Social Media Analytic Tools: A New Approach","authors":"PAGALLA BHAVANI SHANKAR, P L N PRAKASH KUMAR, Lakshmi Prasanna Pulipaka","doi":"10.18535/ijecs/v11i07.4682","DOIUrl":"https://doi.org/10.18535/ijecs/v11i07.4682","url":null,"abstract":"Data is a word plays a vital role in every kind of aspects.  In earlier days data can be expressed manually through communication channels. Day by day technology is enhanced in various etiquette. As per trends, technology is directly proportional to the data. Data will be transmitted from source to destination by using communication channel at wide range massively. The massive data is produced at the moment by using social media, as per today’s technology. Data communication will be passing through internet by adopting various kinds of several media platforms (Face book, twitter, snap chat). Raw data is in the form of unstructured where it moves to social media platforms. Unstructured data is unreadable in nature. To overcome this factor Social Media Analytics (SMA) is a weapon to organize the unstructured data into the manner of structured. To perform the analysis on the unstructured data, need to adopt different analytics tools. Among the different analytical tools, Tanagra is the best optimized tool to organized and  analyzed the unstructured data and produces the users concerned data. \u0000Keywords: Structured Data, Unstructured Data, Social Media, Social Media Analytics","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130005363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Distributed Multi-Ledger Construction Algorithm for Internet of things (IoT) 面向物联网的智能分布式多账本构建算法
Pub Date : 2022-07-18 DOI: 10.18535/ijecs/v11i07.4679
R. Regan, Jayashree J, Kurmitha M
The Internet of Objects (IoT) could be a new paradigm for the linked, data-exchanging nature of things and their parts through a network supported by nodes. IoT has risen to the forefront of emerging technologies in a very type of applications, including peer-to-peer networks, smart energy grids, home and building automation, vehicle-to-vehicle communication, and wearable computing devices, because of the widespread use of small devices and embedded sensor frameworks. thanks to its tremendous expansion and widespread use, it's posed security issues that may prevent it from getting used during a style of new applications. The growing number of networked gadgets creates several access points for attackers, also as security issues. due to the fragile nature of IoT applications including health, automation, and energy grids, security concerns can't be tolerated. DLT (Distributed Ledger Technology) is one such technology which will help to mitigate IoT security threats. The vulnerability of a central node, which can compromise the whole system, are often reduced by adopting a distributed ledger to eliminate the necessity for one node. Blockchain, a distributed ledger technology, has sparked plenty of interest and generated real-world value. Here we construct a distributed multi ledger construction algorithm for peer-to-peer data transaction which involves key generation for each transaction.
物联网(IoT)可能是一种新的范例,通过节点支持的网络,使事物及其部件之间的联系和数据交换成为可能。由于小型设备和嵌入式传感器框架的广泛使用,物联网已经上升到新兴技术的最前沿,包括点对点网络、智能电网、家庭和建筑自动化、车对车通信和可穿戴计算设备。由于其巨大的扩展和广泛的使用,它带来了安全问题,可能会阻止它在一种新的应用程序中使用。越来越多的联网设备为攻击者创造了几个访问点,同时也带来了安全问题。由于物联网应用(包括健康、自动化和电网)的脆弱性,安全问题是不能容忍的。DLT(分布式账本技术)就是一种有助于减轻物联网安全威胁的技术。通过采用分布式账本,消除一个节点的必要性,往往可以减少中心节点的脆弱性,从而危及整个系统。区块链是一种分布式账本技术,它引发了人们的广泛兴趣,并产生了现实世界的价值。本文构建了一种点对点数据交易的分布式多账本构建算法,该算法涉及到每笔交易的密钥生成。
{"title":"Smart Distributed Multi-Ledger Construction Algorithm for Internet of things (IoT)","authors":"R. Regan, Jayashree J, Kurmitha M","doi":"10.18535/ijecs/v11i07.4679","DOIUrl":"https://doi.org/10.18535/ijecs/v11i07.4679","url":null,"abstract":"The Internet of Objects (IoT) could be a new paradigm for the linked, data-exchanging nature of things and their parts through a network supported by nodes. IoT has risen to the forefront of emerging technologies in a very type of applications, including peer-to-peer networks, smart energy grids, home and building automation, vehicle-to-vehicle communication, and wearable computing devices, because of the widespread use of small devices and embedded sensor frameworks. thanks to its tremendous expansion and widespread use, it's posed security issues that may prevent it from getting used during a style of new applications. The growing number of networked gadgets creates several access points for attackers, also as security issues. due to the fragile nature of IoT applications including health, automation, and energy grids, security concerns can't be tolerated. DLT (Distributed Ledger Technology) is one such technology which will help to mitigate IoT security threats. The vulnerability of a central node, which can compromise the whole system, are often reduced by adopting a distributed ledger to eliminate the necessity for one node. Blockchain, a distributed ledger technology, has sparked plenty of interest and generated real-world value. Here we construct a distributed multi ledger construction algorithm for peer-to-peer data transaction which involves key generation for each transaction.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1