首页 > 最新文献

2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Iot Enabling of Vacuum Heat Treatment Chambers for Data Acquisition and Analytics 物联网实现真空热处理室的数据采集和分析
M. Haripriya, S. Saravanan, Rejul M
The Industrial Internet of Things capitalize application of sensors in getting real time data through computers, cloud servers for transformational business outcomes for Industrial applications. Some of the key benefits of Industrial Internet of Things are to reduce human errors, manual labor work, costs, time & money. We also cannot forget the possible underpinnings of IIoT in quality control and maintenance. The heat treatment industry is at turning point, in which digital technology has the capacity to unlock new ways of managing process variables and enhance productivity in vacuum heat treatment operations. Vacuum heat treatment (VHT) plays an important role in capacitor production. During the heat treatment process the zinc element has to undergo certain process within VHT chamber for strengthening the element. The temperature should be maintained and controlled in a proper proportion during capacitor production. By monitoring the live temperature, errors like temperature increase and decrease can be identified and predictive maintenance can be done. In this work, we developed a system to monitor the temperature levels in VHT especially the coolant pipe which is directed to VHT. The developed system uses pt100 sensors to monitor the live temperature of the coolant pipe through a gateway using the PLC. This overall process is done in real time at Schneider Electric, Bangalore. The time taken to complete one process takes 72 hours. The temperature values collected during the process is stored in database created using MySql and then transferred to cloud for analysis to do predictive maintenances.
工业物联网利用传感器的应用,通过计算机、云服务器获取实时数据,为工业应用带来变革性的业务成果。工业物联网的一些主要好处是减少人为错误、体力劳动、成本、时间和金钱。我们也不能忘记工业物联网在质量控制和维护方面的可能基础。热处理行业正处于转折点,数字技术有能力开启管理工艺变量的新方法,并提高真空热处理操作的生产率。真空热处理(VHT)在电容器生产中起着重要的作用。在热处理过程中,锌元素必须在高温室内进行一定的强化处理。在电容器生产过程中,温度应保持和控制在适当的比例。通过监测工作温度,可以识别温度升高或降低等错误,并可以进行预测性维护。在这项工作中,我们开发了一个系统来监测VHT中的温度水平,特别是指向VHT的冷却剂管道。开发的系统采用pt100传感器,通过PLC网关监测冷却剂管道的活温。整个过程在班加罗尔的施耐德电气实时完成。完成一个流程需要72小时。在此过程中收集的温度值存储在使用MySql创建的数据库中,然后传输到云端进行分析以进行预测性维护。
{"title":"Iot Enabling of Vacuum Heat Treatment Chambers for Data Acquisition and Analytics","authors":"M. Haripriya, S. Saravanan, Rejul M","doi":"10.1109/ICCMC.2019.8819829","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819829","url":null,"abstract":"The Industrial Internet of Things capitalize application of sensors in getting real time data through computers, cloud servers for transformational business outcomes for Industrial applications. Some of the key benefits of Industrial Internet of Things are to reduce human errors, manual labor work, costs, time & money. We also cannot forget the possible underpinnings of IIoT in quality control and maintenance. The heat treatment industry is at turning point, in which digital technology has the capacity to unlock new ways of managing process variables and enhance productivity in vacuum heat treatment operations. Vacuum heat treatment (VHT) plays an important role in capacitor production. During the heat treatment process the zinc element has to undergo certain process within VHT chamber for strengthening the element. The temperature should be maintained and controlled in a proper proportion during capacitor production. By monitoring the live temperature, errors like temperature increase and decrease can be identified and predictive maintenance can be done. In this work, we developed a system to monitor the temperature levels in VHT especially the coolant pipe which is directed to VHT. The developed system uses pt100 sensors to monitor the live temperature of the coolant pipe through a gateway using the PLC. This overall process is done in real time at Schneider Electric, Bangalore. The time taken to complete one process takes 72 hours. The temperature values collected during the process is stored in database created using MySql and then transferred to cloud for analysis to do predictive maintenances.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis of Li-Fi based Prevalent Automated Billing Systems in Shopping Malls 基于Li-Fi的购物中心流行自动计费系统分析
Himani Pangasa, Shipra Aggarwal
At mega malls, for grocery shopping and purchase of daily needs artefacts, customers have to wait in extended queues for the billing leading to wastage of their precious time. In order to solve this problem, Different researchers have proposed automation in billing system. When patron picks up an artefact and drops it into the cart, the scanner scans the artefact’s distinctive code and its value, which is flaunted on the display screen of the trolley. After customer has consummate with the purchase, patron goes to the billing counter and pay the total bill which was shown on the display screen incorporated on the cart. In this paper, an attempt has been made to analyse the related works carried out by various researchers in this field based on the main components of smart cart like microcontroller, transmission medium and scanning system.
在大型购物中心,为了购买食品杂货和日用品,顾客不得不排长队等待结账,浪费了宝贵的时间。为了解决这一问题,不同的研究者提出了计费系统的自动化。当顾客拿起一件文物并将其放入购物车时,扫描仪会扫描文物的独特代码及其价值,并在手推车的显示屏上炫耀。在顾客完成购买后,顾客到结账柜台并支付总账,总账显示在购物车的显示屏上。本文从智能小车的主要组成部分单片机、传输介质和扫描系统出发,尝试分析各研究人员在该领域所做的相关工作。
{"title":"An Analysis of Li-Fi based Prevalent Automated Billing Systems in Shopping Malls","authors":"Himani Pangasa, Shipra Aggarwal","doi":"10.1109/ICCMC.2019.8819693","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819693","url":null,"abstract":"At mega malls, for grocery shopping and purchase of daily needs artefacts, customers have to wait in extended queues for the billing leading to wastage of their precious time. In order to solve this problem, Different researchers have proposed automation in billing system. When patron picks up an artefact and drops it into the cart, the scanner scans the artefact’s distinctive code and its value, which is flaunted on the display screen of the trolley. After customer has consummate with the purchase, patron goes to the billing counter and pay the total bill which was shown on the display screen incorporated on the cart. In this paper, an attempt has been made to analyse the related works carried out by various researchers in this field based on the main components of smart cart like microcontroller, transmission medium and scanning system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121112760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of Data Collection Algorithm based on TDA in WSN Mobile Elements 基于TDA的无线传感器网络移动单元数据采集算法的实现
Sadaf Anjum, S. Shrivastava
Sensor nodes transmit data packets from source to destination in wireless sensor network for that they utilize multi-hop routing. While sending data more energy is consumed. Hence for gathering data in interesting area mobile elements are instigate. Delay to transmit long data is major problem in numerous proposed data collection algorithm. Hence to resolve this problem proposed a data collection algorithm with mobile elements. Here for collecting event packets rely on moving window mechanism mobile elements are dispatched. Hence experimental result shows our proposed system can lower data delay.
在无线传感器网络中,传感器节点利用多跳路由将数据包从源端传输到目的端。在发送数据时,会消耗更多的能量。因此,为了在有趣的区域收集数据,移动元素是煽动的。长数据传输延迟是目前众多数据采集算法中存在的主要问题。为了解决这一问题,提出了一种具有移动元素的数据采集算法。这里收集事件包依赖于移动窗口机制,移动元素被分派。实验结果表明,该系统可以有效降低数据延迟。
{"title":"Implementation of Data Collection Algorithm based on TDA in WSN Mobile Elements","authors":"Sadaf Anjum, S. Shrivastava","doi":"10.1109/ICCMC.2019.8819810","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819810","url":null,"abstract":"Sensor nodes transmit data packets from source to destination in wireless sensor network for that they utilize multi-hop routing. While sending data more energy is consumed. Hence for gathering data in interesting area mobile elements are instigate. Delay to transmit long data is major problem in numerous proposed data collection algorithm. Hence to resolve this problem proposed a data collection algorithm with mobile elements. Here for collecting event packets rely on moving window mechanism mobile elements are dispatched. Hence experimental result shows our proposed system can lower data delay.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Chaos based Image Encryption 基于混沌的图像加密技术综述
Kanika Suneja, Shelza Dua, M. Dua
In the current scenario of data transmissions, digital images constitute a major part of multimedia communication. Hence, their security is a great area of concern. In this paper, various chaotic maps, which are used in image encryption, are reviewed and their merits and demerits are discussed. The properties of chaotic maps like stochastic, ergodicity and highly sensitive to initial situations make them reliable for image encryption. Many of the earlier proposed image encryption techniques used low dimensional chaotic maps, which exhibit lowest level of security and have very less ability to handle brute force and statistical attacks. To solve this problem, researchers have established various high dimensional chaotic maps. In this review paper, an effort has been made to highlight the features and techniques of different chaotic maps used for image encryption.
在当前的数据传输场景中,数字图像构成了多媒体通信的重要组成部分。因此,他们的安全是一个令人关切的重大领域。本文综述了各种用于图像加密的混沌映射,并讨论了它们的优缺点。混沌映射具有随机性、遍历性和对初始情况高度敏感等特点,可用于图像加密。许多早期提出的图像加密技术使用低维混沌映射,这表现出最低的安全性,并且处理暴力破解和统计攻击的能力非常差。为了解决这个问题,研究人员建立了各种高维混沌图。在这篇综述文章中,我们着重介绍了用于图像加密的不同混沌映射的特征和技术。
{"title":"A Review of Chaos based Image Encryption","authors":"Kanika Suneja, Shelza Dua, M. Dua","doi":"10.1109/ICCMC.2019.8819860","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819860","url":null,"abstract":"In the current scenario of data transmissions, digital images constitute a major part of multimedia communication. Hence, their security is a great area of concern. In this paper, various chaotic maps, which are used in image encryption, are reviewed and their merits and demerits are discussed. The properties of chaotic maps like stochastic, ergodicity and highly sensitive to initial situations make them reliable for image encryption. Many of the earlier proposed image encryption techniques used low dimensional chaotic maps, which exhibit lowest level of security and have very less ability to handle brute force and statistical attacks. To solve this problem, researchers have established various high dimensional chaotic maps. In this review paper, an effort has been made to highlight the features and techniques of different chaotic maps used for image encryption.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design and Implementation of an Image Classifier using CNN 基于CNN的图像分类器的设计与实现
Sarthak Haldar
Surely there has been no time in history where the lived lives of people have changed more dramatically due to the emergence of Artificial Intelligence. Various research and development has taken place over the years on computer vision which is a branch of AI. AI disciplines like a vision system is applied in various fields like self driving cars, face detection by social media apps and law enforcement softwares, google lens and so on. This paper deals with design and implementation of an efficient way of training a GPU using python libraries to process and classify an image. The design is profoundly described along with its performance efficiency. The image processing techniques presented in this paper includes the concept of neural networks and deep learning.
当然,在历史上没有任何时候,由于人工智能的出现,人们的生活发生了如此巨大的变化。计算机视觉是人工智能的一个分支,多年来已经进行了各种研究和开发。像视觉系统这样的人工智能学科被应用于自动驾驶汽车、社交媒体应用和执法软件的人脸检测、谷歌镜头等各个领域。本文讨论了一种使用python库训练GPU处理和分类图像的有效方法的设计和实现。详细介绍了该系统的设计及其性能效率。本文提出的图像处理技术包括神经网络和深度学习的概念。
{"title":"Design and Implementation of an Image Classifier using CNN","authors":"Sarthak Haldar","doi":"10.1109/ICCMC.2019.8819765","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819765","url":null,"abstract":"Surely there has been no time in history where the lived lives of people have changed more dramatically due to the emergence of Artificial Intelligence. Various research and development has taken place over the years on computer vision which is a branch of AI. AI disciplines like a vision system is applied in various fields like self driving cars, face detection by social media apps and law enforcement softwares, google lens and so on. This paper deals with design and implementation of an efficient way of training a GPU using python libraries to process and classify an image. The design is profoundly described along with its performance efficiency. The image processing techniques presented in this paper includes the concept of neural networks and deep learning.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Steganography Using the Fusion of Quantum Computation and Wavelet Transformation 基于量子计算和小波变换融合的图像隐写
Juned Ahmed Mazumder, K. Hemachandra
In the advancement of information technology the role of security of information is very significant. Many organization including research and educational institute, IT companies exploring the area of quantum computation due to which the field is advancing very quickly. The mechanism of quantum computer provides greater security for quantum data. So in this research we present a new high security steganography system using hybridization of quantum computation and wavelet transformation. The proposed algorithm provides dual security for the embedded data as we transform the normal signal of the high frequency information of wavelet transformation into quantum signal before embedding the secret information. The message extraction process depends on the corresponding coefficient value of low frequency information which acts as a pseudo random key. To assess the accomplishment of our proposed algorithm we have used three parameters MSE, PSNR and RS for different image formats. All these metrics showed that there is very less distortion of the original image.
在信息技术的进步中,信息安全的作用是非常重要的。许多组织,包括研究和教育机构,IT公司探索量子计算领域,由于该领域正在迅速发展。量子计算机的机制为量子数据提供了更大的安全性。为此,我们提出了一种利用量子计算和小波变换相结合的新型高安全性隐写系统。该算法在嵌入秘密信息之前,将小波变换高频信息中的正常信号转换为量子信号,为嵌入数据提供了双重安全性。消息提取过程依赖于相应的低频信息系数值,该系数值作为伪随机密钥。为了评估我们提出的算法的完成,我们对不同的图像格式使用了三个参数MSE, PSNR和RS。所有这些指标都表明,原始图像失真很小。
{"title":"Image Steganography Using the Fusion of Quantum Computation and Wavelet Transformation","authors":"Juned Ahmed Mazumder, K. Hemachandra","doi":"10.1109/ICCMC.2019.8819681","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819681","url":null,"abstract":"In the advancement of information technology the role of security of information is very significant. Many organization including research and educational institute, IT companies exploring the area of quantum computation due to which the field is advancing very quickly. The mechanism of quantum computer provides greater security for quantum data. So in this research we present a new high security steganography system using hybridization of quantum computation and wavelet transformation. The proposed algorithm provides dual security for the embedded data as we transform the normal signal of the high frequency information of wavelet transformation into quantum signal before embedding the secret information. The message extraction process depends on the corresponding coefficient value of low frequency information which acts as a pseudo random key. To assess the accomplishment of our proposed algorithm we have used three parameters MSE, PSNR and RS for different image formats. All these metrics showed that there is very less distortion of the original image.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133995284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Background-modelling techniques for foreground detection and Tracking using Gaussian Mixture Model 基于高斯混合模型的前景检测与跟踪的背景建模技术
Meghana R K, Yojan Chitkara, A. Mohana
Background Modelling and Foreground detection in sports has been achieved by cleverly developing a model of a background from a video by deducing knowledge from frames and comparing this model to every subsequent frame and subtracting the background region from it, hence leaving the foreground detected. This output from GMM background subtraction is fed into the feature extraction algorithm, which segregates the players based on teams. By extracting information of primary colors from each frame, the design of the algorithm based on the color of preference is done. Tracking algorithms Kalman and extended Kalman Filters help to predict and correct the location of players and in correctly estimating their trajectory on the field. Challenges such as shadowing, occlusions and illumination changes are addressed. The designed algorithms are tested against a set of performance parameters for the following datasets (Norway and FIFA) using MATLAB (2017b) and the inferences are respectively made. Object detection, motion detection and Kalman filter algorithms are implemented and the observed results are 100%, 84% and 100% accuracy respectively. With the results quantification and performance analysis, it is observed that with the decrease in contrast between player jerseys a decrease in detection accuracy occurs and with players crowded regions on the field and occluded players a decrease in tracking accuracy was observed.
体育运动中的背景建模和前景检测是通过巧妙地从视频中推导出一个背景模型,并将该模型与随后的每一帧进行比较,然后从中减去背景区域,从而使前景被检测到。GMM背景减法的输出被输入到特征提取算法中,该算法根据球队分离球员。通过从每帧图像中提取原色信息,完成基于颜色偏好的算法设计。跟踪算法卡尔曼和扩展卡尔曼滤波器有助于预测和纠正球员的位置,并正确估计他们在场上的轨迹。解决了阴影、遮挡和照明变化等挑战。使用MATLAB (2017b)针对以下数据集(Norway和FIFA)的一组性能参数对设计的算法进行了测试,并分别做出了推论。实现了目标检测、运动检测和卡尔曼滤波算法,观测结果准确率分别为100%、84%和100%。通过对结果的量化和性能分析,可以发现随着球员球衣对比度的降低,检测精度会下降,球员在场上的拥挤区域和被遮挡的球员会降低跟踪精度。
{"title":"Background-modelling techniques for foreground detection and Tracking using Gaussian Mixture Model","authors":"Meghana R K, Yojan Chitkara, A. Mohana","doi":"10.1109/ICCMC.2019.8819825","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819825","url":null,"abstract":"Background Modelling and Foreground detection in sports has been achieved by cleverly developing a model of a background from a video by deducing knowledge from frames and comparing this model to every subsequent frame and subtracting the background region from it, hence leaving the foreground detected. This output from GMM background subtraction is fed into the feature extraction algorithm, which segregates the players based on teams. By extracting information of primary colors from each frame, the design of the algorithm based on the color of preference is done. Tracking algorithms Kalman and extended Kalman Filters help to predict and correct the location of players and in correctly estimating their trajectory on the field. Challenges such as shadowing, occlusions and illumination changes are addressed. The designed algorithms are tested against a set of performance parameters for the following datasets (Norway and FIFA) using MATLAB (2017b) and the inferences are respectively made. Object detection, motion detection and Kalman filter algorithms are implemented and the observed results are 100%, 84% and 100% accuracy respectively. With the results quantification and performance analysis, it is observed that with the decrease in contrast between player jerseys a decrease in detection accuracy occurs and with players crowded regions on the field and occluded players a decrease in tracking accuracy was observed.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132217151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Designing a Sales Prediction Model in Tourism Industry and Hotel Recommendation Based on Hybrid Recommendation 基于混合推荐的旅游行业及酒店销售预测模型设计
Piyush Anil Bodhankar, Rajesh K. Nasare, G. Yenurkar
As the trend of e-commerce and online shopping is increasing day by day, we need a method which can be helpful to decide whether to buy the product or not. Here the opinions of the other customers and rating for that product can be used as a considerably good parameter for designing such a system. With the development of new technologies we have a possible solution in the form of recommendation system. Recommendation system gives an important help in providing the necessary information to user based on personalized and practical services. The most vital technique in this field is which plays a crucial role is Collaborative filtering. In this paper we present a recommendations system for tourism and hotel based on enhanced Collaborative filtering approach.
随着电子商务和网上购物的趋势日益增加,我们需要一种方法,可以帮助我们决定是否购买产品。在这里,其他客户的意见和该产品的评级可以作为设计这样一个系统的一个相当好的参数。随着新技术的发展,我们有一个可能的解决方案,以推荐系统的形式。推荐系统在个性化和实用性服务的基础上为用户提供必要的信息提供了重要的帮助。协同过滤是该领域中最重要的技术之一,在该领域中起着至关重要的作用。本文提出了一种基于增强型协同过滤方法的旅游酒店推荐系统。
{"title":"Designing a Sales Prediction Model in Tourism Industry and Hotel Recommendation Based on Hybrid Recommendation","authors":"Piyush Anil Bodhankar, Rajesh K. Nasare, G. Yenurkar","doi":"10.1109/ICCMC.2019.8819792","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819792","url":null,"abstract":"As the trend of e-commerce and online shopping is increasing day by day, we need a method which can be helpful to decide whether to buy the product or not. Here the opinions of the other customers and rating for that product can be used as a considerably good parameter for designing such a system. With the development of new technologies we have a possible solution in the form of recommendation system. Recommendation system gives an important help in providing the necessary information to user based on personalized and practical services. The most vital technique in this field is which plays a crucial role is Collaborative filtering. In this paper we present a recommendations system for tourism and hotel based on enhanced Collaborative filtering approach.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing Cyber Security using Artificial Intelligence – A survey 利用人工智能提供网络安全-一项调查
Sagar B.S, N. S, Nithin Kashyap, Sachin D.N
Artificial intelligence is really a kind of computerized version of human intelligence. The way artificial intelligence works is like learning iteratively again and again, just like humans. In this generation, the threat of landscape is unquestionably evolving. The cyber attackers are entirely focused on financial rewards. But the department has found a new way to prevent attacks before they occur, as the old traditional way can no longer be relied upon. This paper introduces the need for the development of cybersecurity skills and how artificial intelligence can be implied to improve skills through the use of artificial neural networks and machine learning algorithms.
人工智能实际上是一种计算机化的人类智能。人工智能的工作方式就像人类一样,一次又一次地迭代学习。在这一代人中,景观的威胁无疑在不断演变。网络攻击者完全专注于金钱奖励。但是国防部已经找到了一种新的方法,可以在袭击发生之前进行预防,因为旧的传统方法已经不能再依靠了。本文介绍了网络安全技能发展的需求,以及如何通过使用人工神经网络和机器学习算法来暗示人工智能来提高技能。
{"title":"Providing Cyber Security using Artificial Intelligence – A survey","authors":"Sagar B.S, N. S, Nithin Kashyap, Sachin D.N","doi":"10.1109/ICCMC.2019.8819719","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819719","url":null,"abstract":"Artificial intelligence is really a kind of computerized version of human intelligence. The way artificial intelligence works is like learning iteratively again and again, just like humans. In this generation, the threat of landscape is unquestionably evolving. The cyber attackers are entirely focused on financial rewards. But the department has found a new way to prevent attacks before they occur, as the old traditional way can no longer be relied upon. This paper introduces the need for the development of cybersecurity skills and how artificial intelligence can be implied to improve skills through the use of artificial neural networks and machine learning algorithms.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"728 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133596840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Extension of the Lexicon Algorithm for Sarcasm Detection 反讽检测词典算法的扩展
Joseph Herve Balanke, H. V
Lexicon algorithm is used to determine the sentiment expressed by a textual content. This sentiment might be negative, neutral or positive. It is possible to be sarcastic using only positive or neutral sentiment textual contents. Hence, lexicon algorithm can be useful but yet insufficient for sarcasm detection. It is necessary to extend the lexicon algorithm in order to come out with systems that would be proven efficient for sarcasm detection on neutral and positive sentiment textual contents. In this paper, two sarcasm analysis systems both obtained from the extension of the lexicon algorithm have been proposed for that sake. The first system consists of the combination of a lexicon algorithm and a pure sarcasm analysis algorithm. The second system consists of the combination of a lexicon algorithm and a sentiment prediction algorithm.
词典算法用于确定文本内容所表达的情感。这种情绪可能是消极的、中性的或积极的。仅使用积极或中性情绪的文本内容也可以是讽刺的。因此,词典算法对讽刺语检测是有用的,但还不够。有必要对词典算法进行扩展,以提出对中性和积极情感文本内容进行有效的讽刺检测的系统。为此,本文提出了两种基于词典扩展算法的讽刺语分析系统。第一个系统是词典算法和纯讽刺分析算法的结合。第二个系统由词典算法和情感预测算法的结合组成。
{"title":"Extension of the Lexicon Algorithm for Sarcasm Detection","authors":"Joseph Herve Balanke, H. V","doi":"10.1109/ICCMC.2019.8819845","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819845","url":null,"abstract":"Lexicon algorithm is used to determine the sentiment expressed by a textual content. This sentiment might be negative, neutral or positive. It is possible to be sarcastic using only positive or neutral sentiment textual contents. Hence, lexicon algorithm can be useful but yet insufficient for sarcasm detection. It is necessary to extend the lexicon algorithm in order to come out with systems that would be proven efficient for sarcasm detection on neutral and positive sentiment textual contents. In this paper, two sarcasm analysis systems both obtained from the extension of the lexicon algorithm have been proposed for that sake. The first system consists of the combination of a lexicon algorithm and a pure sarcasm analysis algorithm. The second system consists of the combination of a lexicon algorithm and a sentiment prediction algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"55 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1