首页 > 最新文献

2023 International Conference on Disruptive Technologies (ICDT)最新文献

英文 中文
Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future 未来6G技术零信任架构、应用领域与挑战研究
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150745
Richa Singh, Gaurav Srivastav, Rekha Kashyap, Satvik Vats
Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, the combination of 6G and AIML utilization may frequently be a double-edged sword because AI has the capacity to either protect or compromise security and privacy. Proactive threat detection, the use of mitigating intelligent techniques, and network automation in future are needed to enable the achievement of independent networks in 6G. As a result, this paper has detailed focus on the ongoing projects based on 6G and factors that make 6G technology necessary. The role of ZT architecture is discussed in detail, use of AIML in 6G, Various application areas and challenges associated in 6G has been mentioned in this paper.
智能网络编排和管理是6G网络的重要组成部分。因此,机器学习和人工智能在正在设想的6G范式中发挥着重要作用。然而,6G和AI的结合使用可能经常是一把双刃剑,因为AI具有保护或损害安全和隐私的能力。主动威胁检测、缓解智能技术的使用以及未来的网络自动化是实现6G独立网络的必要条件。因此,本文详细介绍了基于6G的正在进行的项目以及使6G技术成为必要的因素。本文详细讨论了ZT架构的作用、AIML在6G中的应用、6G相关的各种应用领域和挑战。
{"title":"Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future","authors":"Richa Singh, Gaurav Srivastav, Rekha Kashyap, Satvik Vats","doi":"10.1109/ICDT57929.2023.10150745","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150745","url":null,"abstract":"Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, the combination of 6G and AIML utilization may frequently be a double-edged sword because AI has the capacity to either protect or compromise security and privacy. Proactive threat detection, the use of mitigating intelligent techniques, and network automation in future are needed to enable the achievement of independent networks in 6G. As a result, this paper has detailed focus on the ongoing projects based on 6G and factors that make 6G technology necessary. The role of ZT architecture is discussed in detail, use of AIML in 6G, Various application areas and challenges associated in 6G has been mentioned in this paper.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence of Geo-IoT with Advanced Technologies 地理物联网与先进技术的融合
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10151106
Monalisha Sinha, Shalini, M. Thejaswini
IoT is an emerging digital technology where every physical object is connected to one another via the internet. IoT devices embedded with GPS sensors are called Geo-IoT systems where spatial data is the most prominent requirement in developing any IoT services and applications. Geo-IoT data can be used in various IoT applications for optimizing routes, tracking assets, real-time traffic notification, auto-driving, precision agriculture, anti-theft prevention, etc. This paper provides a review of the convergence of Geo-IoT with advanced technologies such as artificial intelligence, machine learning, and blockchain technology. This paper mainly discusses the current status and applicability of artificial intelligence and machine learning methods in solving and computing location-based IoT data for developing new advanced Geo-IoT applications, routing protocols, and security issues.
物联网是一种新兴的数字技术,每个物理对象都通过互联网相互连接。嵌入GPS传感器的物联网设备被称为地理物联网系统,其中空间数据是开发任何物联网服务和应用程序的最突出要求。地理物联网数据可用于各种物联网应用,用于优化路线、跟踪资产、实时交通通知、自动驾驶、精准农业、防盗等。本文综述了Geo-IoT与人工智能、机器学习和区块链技术等先进技术的融合。本文主要讨论了人工智能和机器学习方法在解决和计算基于位置的物联网数据方面的现状和适用性,以开发新的高级地理物联网应用、路由协议和安全问题。
{"title":"Convergence of Geo-IoT with Advanced Technologies","authors":"Monalisha Sinha, Shalini, M. Thejaswini","doi":"10.1109/ICDT57929.2023.10151106","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10151106","url":null,"abstract":"IoT is an emerging digital technology where every physical object is connected to one another via the internet. IoT devices embedded with GPS sensors are called Geo-IoT systems where spatial data is the most prominent requirement in developing any IoT services and applications. Geo-IoT data can be used in various IoT applications for optimizing routes, tracking assets, real-time traffic notification, auto-driving, precision agriculture, anti-theft prevention, etc. This paper provides a review of the convergence of Geo-IoT with advanced technologies such as artificial intelligence, machine learning, and blockchain technology. This paper mainly discusses the current status and applicability of artificial intelligence and machine learning methods in solving and computing location-based IoT data for developing new advanced Geo-IoT applications, routing protocols, and security issues.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Machine Learning Security Algorithm for the Anonymous user Detection in Ultra Dense 5G Cloud Networks 超密集5G云网络中匿名用户检测的增强机器学习安全算法
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150909
Ramesh Babu P, Tariku Birhanu, K. R. N. K. Kumar, Manjunath Gadiparthi
In general, high-density network services have a large number of users. This is seen as the main problem of that network. As users increase, so does the amount of service provided to them. Thus, have to pay separate attention to serving and serving them. It is imperative to ensure their maximum security if they are the primary user. Thus, security management is much less on high density 5G networks. A security algorithm has been proposed to improve these issues. This algorithm, designed for machine learning, first detects the primary user. Their security is prioritized by calculating their input and output times. It is also designed to detect secondary users and anonymous user. These anonymous users were creating the resource utilization and security vulnerabilities in the network. So, the primary user protection and anonymous user identification getting more priority in the ultra dense cloud networks.
一般来说,高密度的网络业务拥有大量的用户。这被视为该网络的主要问题。随着用户的增加,提供给他们的服务量也在增加。因此,必须把服务和服务的注意力分开。如果它们是主要用户,则必须确保它们的最大安全性。因此,在高密度5G网络上,安全管理要少得多。提出了一种安全算法来改善这些问题。这个算法是为机器学习设计的,首先检测主用户。通过计算它们的输入和输出时间来确定它们的安全性的优先级。它还可以检测辅助用户和匿名用户。这些匿名用户正在网络中制造资源利用率和安全漏洞。因此,在超密集的云网络中,主用户保护和匿名用户识别变得越来越重要。
{"title":"An Enhanced Machine Learning Security Algorithm for the Anonymous user Detection in Ultra Dense 5G Cloud Networks","authors":"Ramesh Babu P, Tariku Birhanu, K. R. N. K. Kumar, Manjunath Gadiparthi","doi":"10.1109/ICDT57929.2023.10150909","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150909","url":null,"abstract":"In general, high-density network services have a large number of users. This is seen as the main problem of that network. As users increase, so does the amount of service provided to them. Thus, have to pay separate attention to serving and serving them. It is imperative to ensure their maximum security if they are the primary user. Thus, security management is much less on high density 5G networks. A security algorithm has been proposed to improve these issues. This algorithm, designed for machine learning, first detects the primary user. Their security is prioritized by calculating their input and output times. It is also designed to detect secondary users and anonymous user. These anonymous users were creating the resource utilization and security vulnerabilities in the network. So, the primary user protection and anonymous user identification getting more priority in the ultra dense cloud networks.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and Simulation of Needle-Tissue Interaction in Robotic Surgery 机器人手术中针-组织相互作用的建模与仿真
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150819
J. Shah, Prashant Johri, Pawan Kumar Singh Nain
In robotic surgery practical applications one of the main bottlenecks is to accurately model tissue and needle interactions, in such modelling generally needle is taken as biocompatible material and tissue a elastic, plastic and viscous material. In this study, we present an adaptive finite element algorithm for simulating the indentation of the needle into tissue which is gelatin like viscoelastic material, the path of the needle takes a unique and non-predetermined route. Apart from the modelling the tissue and needle other aspect of the work requires proper boundary conditions and application of the load which mimic the real-world scenario. A cohesive zone model is employed to describe the fracture process, The distribution of strain energy density in the surrounding tissue is utilized to determine the direction of crack propagation. The simulation results presented in this study are centered on the deep penetration of a bevel-tip needle with a programmable design, which offers steering control by modifying the offset between interlocked needle segments. We primarily discuss the relationship between how size and number of mesh affect the stress in modelling tissue-needle interaction. We have done modelling and simulation in ANSYS software.
在机器人外科手术的实际应用中,一个主要的瓶颈是如何准确地模拟组织与针头的相互作用,在这种建模中,通常将针头视为生物相容性材料,而将组织视为具有弹性、塑性和粘性的材料。在这项研究中,我们提出了一种自适应有限元算法来模拟针在明胶样粘弹性材料组织中的压痕,针的路径采用独特的非预定路线。除了对组织和针进行建模外,工作的其他方面还需要适当的边界条件和模拟现实世界场景的负载应用。采用内聚区模型描述断裂过程,利用周围组织中应变能密度的分布来确定裂纹扩展方向。本研究的仿真结果以可编程设计的斜尖针的深穿透为中心,该设计通过修改互锁针段之间的偏移量来提供转向控制。我们主要讨论了在组织-针相互作用模型中网格大小和网格数量对应力的影响关系。在ANSYS软件中进行了建模和仿真。
{"title":"Modelling and Simulation of Needle-Tissue Interaction in Robotic Surgery","authors":"J. Shah, Prashant Johri, Pawan Kumar Singh Nain","doi":"10.1109/ICDT57929.2023.10150819","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150819","url":null,"abstract":"In robotic surgery practical applications one of the main bottlenecks is to accurately model tissue and needle interactions, in such modelling generally needle is taken as biocompatible material and tissue a elastic, plastic and viscous material. In this study, we present an adaptive finite element algorithm for simulating the indentation of the needle into tissue which is gelatin like viscoelastic material, the path of the needle takes a unique and non-predetermined route. Apart from the modelling the tissue and needle other aspect of the work requires proper boundary conditions and application of the load which mimic the real-world scenario. A cohesive zone model is employed to describe the fracture process, The distribution of strain energy density in the surrounding tissue is utilized to determine the direction of crack propagation. The simulation results presented in this study are centered on the deep penetration of a bevel-tip needle with a programmable design, which offers steering control by modifying the offset between interlocked needle segments. We primarily discuss the relationship between how size and number of mesh affect the stress in modelling tissue-needle interaction. We have done modelling and simulation in ANSYS software.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132209583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Model on Blockchain for Secured Mobile Communication 安全移动通信区块链深度学习模型
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150581
P. Iyappan, Shikha Maheshwari, A. Saranya, M. Jayaprakash
The Internet of Things (IoT) is an open network model that aims to build and link the interactions between the devices and links. Conventional blockchain model aimed at increase the scalability but often it is limited by its capacity and performance. The deep learning algorithms aims to determine the parameters of the blockchain that finds the optimal value required to obtain an increased scalability without any limitations in its performance. In this paper, a deep learning model is integrated with the blockchain to improve the process of communication in a secured way. The deep learning model optimizes the necessary security parameters required to transfer the data in a secured way. The experimental validation shows an increased scalable task allocation than its predecessors.
物联网(Internet of Things, IoT)是一个开放的网络模型,旨在建立和连接设备和链路之间的交互。传统的区块链模型旨在提高可扩展性,但往往受到其容量和性能的限制。深度学习算法旨在确定区块链的参数,这些参数可以找到获得更高可扩展性所需的最佳值,而不会对其性能产生任何限制。本文将深度学习模型与区块链相结合,以安全的方式改进通信过程。深度学习模型优化了以安全方式传输数据所需的必要安全参数。实验验证表明,该方法比以前的方法具有更高的可扩展性任务分配。
{"title":"Deep Learning Model on Blockchain for Secured Mobile Communication","authors":"P. Iyappan, Shikha Maheshwari, A. Saranya, M. Jayaprakash","doi":"10.1109/ICDT57929.2023.10150581","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150581","url":null,"abstract":"The Internet of Things (IoT) is an open network model that aims to build and link the interactions between the devices and links. Conventional blockchain model aimed at increase the scalability but often it is limited by its capacity and performance. The deep learning algorithms aims to determine the parameters of the blockchain that finds the optimal value required to obtain an increased scalability without any limitations in its performance. In this paper, a deep learning model is integrated with the blockchain to improve the process of communication in a secured way. The deep learning model optimizes the necessary security parameters required to transfer the data in a secured way. The experimental validation shows an increased scalable task allocation than its predecessors.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121311557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Job and Internship Assistance Application 工作及实习援助申请
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150490
Disha Tyagi, Daniyal Kazim, Soumen Bhadra, Avantika Gupta, Praveen Kumar, Abhishek Sharma, Himanshu Chaudhary
Today’s fast-paced world requires everyone to remain updated about new opportunities arising in their field of interest. It is especially crucial for engineering students who are eager to be placed in top IT companies. This research paper presents an android recruitment assistance application that directly targets the students of an engineering institution in search of a technical job or an internship. This job aggregator provides a user-friendly environment that assists students in all placement-related activities. The application is created using Android Studio and can run on version 6 and above. The design of the application has been implemented using Kotlin instead of Java.
当今快节奏的世界要求每个人都随时了解自己感兴趣的领域中出现的新机会。对于渴望进入顶级It公司的工科学生来说,这一点尤为重要。本研究论文提出了一个机器人招聘辅助应用程序,直接针对工程院校的学生在寻找技术工作或实习。这个工作聚合器提供了一个用户友好的环境,帮助学生完成所有与实习相关的活动。该应用程序是使用Android Studio创建的,可以在版本6或更高的版本上运行。应用程序的设计是使用Kotlin而不是Java来实现的。
{"title":"Job and Internship Assistance Application","authors":"Disha Tyagi, Daniyal Kazim, Soumen Bhadra, Avantika Gupta, Praveen Kumar, Abhishek Sharma, Himanshu Chaudhary","doi":"10.1109/ICDT57929.2023.10150490","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150490","url":null,"abstract":"Today’s fast-paced world requires everyone to remain updated about new opportunities arising in their field of interest. It is especially crucial for engineering students who are eager to be placed in top IT companies. This research paper presents an android recruitment assistance application that directly targets the students of an engineering institution in search of a technical job or an internship. This job aggregator provides a user-friendly environment that assists students in all placement-related activities. The application is created using Android Studio and can run on version 6 and above. The design of the application has been implemented using Kotlin instead of Java.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Neural Networks for Comprehensive Multimodal Emotion Recognition 综合多模态情绪识别的深度神经网络
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150945
Ashutosh Tiwari, Satyam Kumar, Tushar Mehrotra, Rajneesh Kumar Singh
Emotions may be expressed in many different ways, making automatic affect recognition challenging. Several industries may benefit from this technology, including audiovisual search and human- machine interface. Recently, neural networks have been developed to assess emotional states with unprecedented accuracy. We provide an approach to emotion identification that makes use of both visual and aural signals. It’s crucial to isolate relevant features in order to accurately represent the nuanced emotions conveyed in a wide range of speech patterns. We do this by using a Convolutional Neural Network (CNN) to parse the audio track for feature extraction and a 50-layer deep ResNet to process the visual track. Machine learning algorithms, in addition to needing to extract the characteristics, should also be robust against outliers and reflective of their surroundings. To solve this problem, LSTM networks are used. We train the system from the ground up, using the RECOLA datasets from the AVEC 2016 emotion recognition research challenge, and we demonstrate that our method is superior to prior approaches that relied on manually constructed aural and visual cues for identifying genuine emotional states. It has been demonstrated that the visual modality predicts valence more accurately than arousal. The best results for the valence dimension from the RECOLA dataset are shown in Table III below.
情绪可能以许多不同的方式表达,这使得自动情感识别具有挑战性。包括视听搜索和人机界面在内的一些行业可能会从这项技术中受益。最近,神经网络已经发展到以前所未有的准确性评估情绪状态。我们提供了一种利用视觉和听觉信号的情感识别方法。为了准确地表达各种语言模式中微妙的情感,分离出相关的特征是至关重要的。我们使用卷积神经网络(CNN)来解析音轨进行特征提取,并使用50层深度ResNet来处理视觉轨道。机器学习算法除了需要提取特征外,还应该对异常值具有鲁棒性,并反映其周围环境。为了解决这个问题,使用了LSTM网络。我们从头开始训练系统,使用来自AVEC 2016情绪识别研究挑战的RECOLA数据集,我们证明了我们的方法优于之前依赖于手动构建的听觉和视觉线索来识别真实情绪状态的方法。已经证明,视觉模态比唤醒更准确地预测效价。来自RECOLA数据集的价维的最佳结果如下表III所示。
{"title":"Deep Neural Networks for Comprehensive Multimodal Emotion Recognition","authors":"Ashutosh Tiwari, Satyam Kumar, Tushar Mehrotra, Rajneesh Kumar Singh","doi":"10.1109/ICDT57929.2023.10150945","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150945","url":null,"abstract":"Emotions may be expressed in many different ways, making automatic affect recognition challenging. Several industries may benefit from this technology, including audiovisual search and human- machine interface. Recently, neural networks have been developed to assess emotional states with unprecedented accuracy. We provide an approach to emotion identification that makes use of both visual and aural signals. It’s crucial to isolate relevant features in order to accurately represent the nuanced emotions conveyed in a wide range of speech patterns. We do this by using a Convolutional Neural Network (CNN) to parse the audio track for feature extraction and a 50-layer deep ResNet to process the visual track. Machine learning algorithms, in addition to needing to extract the characteristics, should also be robust against outliers and reflective of their surroundings. To solve this problem, LSTM networks are used. We train the system from the ground up, using the RECOLA datasets from the AVEC 2016 emotion recognition research challenge, and we demonstrate that our method is superior to prior approaches that relied on manually constructed aural and visual cues for identifying genuine emotional states. It has been demonstrated that the visual modality predicts valence more accurately than arousal. The best results for the valence dimension from the RECOLA dataset are shown in Table III below.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116768004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rideshare Transportation Fare Prediction using Deep Neural Networks 基于深度神经网络的拼车交通票价预测
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150947
Namrata Mohan Bagal, Madhuri Dinesh Gabhane, C. Mahamuni
The taxi service industry has been growing recently, and in the coming years, a strong increase is predicted. So many companies have developed to respond to this increased demand for cab rides. To maintain transparency and avoid unfair practices, the main goal is to predict travel costs before booking a taxi reservation. Our system is made to enable users to calculate the cost of a taxi trip by using a variety of dynamic factors, including the weather, the availability of cabs, cab size, and the distance between two sites. Here our system uses many algorithms to predict the fare amount but in all of them, the DNN algorithm works better than other algorithms.
出租车服务行业最近一直在增长,预计在未来几年将有强劲的增长。因此,许多公司已经发展起来,以应对日益增长的出租车出行需求。为了保持透明度和避免不公平的做法,主要目标是在预订出租车之前预测出行成本。我们的系统使用户能够通过使用各种动态因素来计算出租车旅行的成本,包括天气、出租车的可用性、出租车的大小和两个站点之间的距离。在这里,我们的系统使用了许多算法来预测车费金额,但在所有这些算法中,DNN算法都比其他算法效果更好。
{"title":"Rideshare Transportation Fare Prediction using Deep Neural Networks","authors":"Namrata Mohan Bagal, Madhuri Dinesh Gabhane, C. Mahamuni","doi":"10.1109/ICDT57929.2023.10150947","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150947","url":null,"abstract":"The taxi service industry has been growing recently, and in the coming years, a strong increase is predicted. So many companies have developed to respond to this increased demand for cab rides. To maintain transparency and avoid unfair practices, the main goal is to predict travel costs before booking a taxi reservation. Our system is made to enable users to calculate the cost of a taxi trip by using a variety of dynamic factors, including the weather, the availability of cabs, cab size, and the distance between two sites. Here our system uses many algorithms to predict the fare amount but in all of them, the DNN algorithm works better than other algorithms.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122534140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
URL Based Malicious Activity Detection Using Machine Learning 基于URL的机器学习恶意活动检测
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150899
Tagba Zoukarneini Difaizi, Ouedraogo Pengd-Wende Leonel Camille, Tadiwanashe Caleb Benhura, Ganesh Gupta
The constant use of the Internet has led to an increased vulnerability to malware attacks through malicious websites. The goal of this research is to create a machine-learning algorithm that will detect whether URLs contain susceptible activities such as viruses, phishing, malware, worms, etc. or are secure. Malicious URLs are compromised URLs that are employed in drive-by downloads and online attacks. Phishing and social engineering are common types of attacks that use malicious URLs. The fact that one-third of all websites have the potential to be harmful shows how widespread bad URLs are in online crime. This work deals with three machine learning models, such as random forest, light GBM, and XG Boost, to analyse our data and give the best one as per the results and analysis.
互联网的不断使用导致越来越容易受到恶意网站的恶意软件攻击。本研究的目标是创建一种机器学习算法,该算法将检测url是否包含易受影响的活动,如病毒、网络钓鱼、恶意软件、蠕虫等,或者是否安全。恶意url是指被破坏的url,用于飞车下载和在线攻击。网络钓鱼和社会工程是使用恶意url的常见攻击类型。三分之一的网站都有潜在的危害,这一事实表明,不良网址在网络犯罪中是多么普遍。这项工作涉及三种机器学习模型,如随机森林,轻型GBM和XG Boost,来分析我们的数据,并根据结果和分析给出最好的模型。
{"title":"URL Based Malicious Activity Detection Using Machine Learning","authors":"Tagba Zoukarneini Difaizi, Ouedraogo Pengd-Wende Leonel Camille, Tadiwanashe Caleb Benhura, Ganesh Gupta","doi":"10.1109/ICDT57929.2023.10150899","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150899","url":null,"abstract":"The constant use of the Internet has led to an increased vulnerability to malware attacks through malicious websites. The goal of this research is to create a machine-learning algorithm that will detect whether URLs contain susceptible activities such as viruses, phishing, malware, worms, etc. or are secure. Malicious URLs are compromised URLs that are employed in drive-by downloads and online attacks. Phishing and social engineering are common types of attacks that use malicious URLs. The fact that one-third of all websites have the potential to be harmful shows how widespread bad URLs are in online crime. This work deals with three machine learning models, such as random forest, light GBM, and XG Boost, to analyse our data and give the best one as per the results and analysis.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121644129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Credit Card Fraud Detection: Analyzing the Performance of Four Machine Learning Models 信用卡欺诈检测:分析四种机器学习模型的性能
Pub Date : 2023-05-11 DOI: 10.1109/ICDT57929.2023.10150782
Rupali Aggarwal, P. Sarangi, A. Sahoo
In the era where most of our transactions whether it is for shopping, electricity bills, insurance payments, school and college fees are paid using plastic money through wireless and various online modes. Increase in both online transactions and ecommerce platforms has given rise to many online frauds these days and also security threats. To detect these fraudulent activities, we created a machine learning model. In this research we modeled a dataset using Machine Learning Algorithms. It is proposed to predict fraudulent transactions made by users. It is a real-life example of a binary Classification problem. This research emphasizes on analyzing and pre-processing the dataset and implementing various python libraries, and used concepts like Exploratory Data Analysis, Data Modeling, Feature Extraction etc. and implemented a fraud detection process using the four algorithms.
在这个时代,我们的大部分交易,无论是购物,电费,保险支付,学校和大学学费都是通过无线和各种在线模式使用塑料货币支付的。如今,网上交易和电子商务平台的增加引发了许多网上欺诈行为,也带来了安全威胁。为了检测这些欺诈行为,我们创建了一个机器学习模型。在这项研究中,我们使用机器学习算法对数据集进行建模。提出了预测用户欺诈交易的方法。这是一个现实生活中的二元分类问题。本研究着重分析和预处理数据集,实现各种python库,并使用探索性数据分析,数据建模,特征提取等概念,并使用四种算法实现欺诈检测过程。
{"title":"Credit Card Fraud Detection: Analyzing the Performance of Four Machine Learning Models","authors":"Rupali Aggarwal, P. Sarangi, A. Sahoo","doi":"10.1109/ICDT57929.2023.10150782","DOIUrl":"https://doi.org/10.1109/ICDT57929.2023.10150782","url":null,"abstract":"In the era where most of our transactions whether it is for shopping, electricity bills, insurance payments, school and college fees are paid using plastic money through wireless and various online modes. Increase in both online transactions and ecommerce platforms has given rise to many online frauds these days and also security threats. To detect these fraudulent activities, we created a machine learning model. In this research we modeled a dataset using Machine Learning Algorithms. It is proposed to predict fraudulent transactions made by users. It is a real-life example of a binary Classification problem. This research emphasizes on analyzing and pre-processing the dataset and implementing various python libraries, and used concepts like Exploratory Data Analysis, Data Modeling, Feature Extraction etc. and implemented a fraud detection process using the four algorithms.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132568851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on Disruptive Technologies (ICDT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1