首页 > 最新文献

2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)最新文献

英文 中文
LitUp-A Wireless Lighting System using IOT LitUp-A无线照明系统使用物联网
A. Joshi, Akshaykumar Athani, K. Tangod
The world is focalizing towards smart technologies through wireless communication channel and at the same time facing energy crisis. This article implements the working of RGB color model which is essentially an automated eccentric lighting system which works using the ESP8266. We have named this model as LitUP. This proposed article includes client-server mechanism which instructs ESP8266 via a mobile application or website. MQTT protocol is used which is secured form of TCP/IP. This proposed model controls the intensity, brightness and hue of the lighting system easily with the app or website which has user friendly interface which provides choice for different types light depending on the aura. By default the white light will be switched on when the person enters the room as detected by the PIR sensor.
世界正在通过无线通信渠道向智能技术发展,同时也面临着能源危机。本文实现了RGB色彩模型的工作原理,它本质上是一个使用ESP8266工作的自动偏心照明系统。我们把这个型号命名为LitUP。这篇建议的文章包括客户机-服务器机制,它通过移动应用程序或网站指示ESP8266。使用MQTT协议,它是TCP/IP的安全形式。这个提议的模型可以通过应用程序或网站轻松控制照明系统的强度、亮度和色调,这些应用程序或网站具有用户友好的界面,可以根据光环选择不同类型的光。默认情况下,当人进入房间时,PIR传感器会打开白光。
{"title":"LitUp-A Wireless Lighting System using IOT","authors":"A. Joshi, Akshaykumar Athani, K. Tangod","doi":"10.1109/ICGCIOT.2018.8753055","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753055","url":null,"abstract":"The world is focalizing towards smart technologies through wireless communication channel and at the same time facing energy crisis. This article implements the working of RGB color model which is essentially an automated eccentric lighting system which works using the ESP8266. We have named this model as LitUP. This proposed article includes client-server mechanism which instructs ESP8266 via a mobile application or website. MQTT protocol is used which is secured form of TCP/IP. This proposed model controls the intensity, brightness and hue of the lighting system easily with the app or website which has user friendly interface which provides choice for different types light depending on the aura. By default the white light will be switched on when the person enters the room as detected by the PIR sensor.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Security System for Businesses using Internet of Things (IoT) 使用物联网(IoT)的企业智能安全系统
Santosh Mahendra, Mithileysh Sathiyanarayanan, R. Vasu
There is a sudden exponential use of security systems in our day to day life. For example, security in a business space, organisation, or bank locker is important to every individual now. Lately, security cameras are being utilized in order to build safe and secure places in organisations. However, this technology needs a person regularly to detect any problem in the frame taken from the camera. The main aim of this paper is to enhance the traditional security system. The security system based on the IoT platform has the potential of interacting real-time with the device. The system consists of a camera, voice sensor/microphone, motion/activity sensor and an LTE/Wi-Fi module which is interfaced with the heart of the system, processor. This entire economic system using IoT in real-time will allow mobile devices and computers to remotely track the activities occurring at the location where the IoT device is placed and records all the activities, which will be saved on one’s cloud storage account. The IoT based security system helps in added protection of the user/customer property. Security systems are designed to perform certain tasks when a secured zone is breached. In this paper, notification is sent to the concerned person as an alert where the user can take necessary actions. The main advantage of this system is the ability to remotely manage one’s property 24/7. With this IoT based smart locker, one can monitor, get alerts, notify in case of emergency from anywhere in the world using mobile application via cloud connectivity 24/7. To be specific, we aim to design a light-weight, low cost, extensible, flexible wireless smart security system using IoT which employs the integration of various latest technologies. The combination of the various technologies can be used synergistically as a smart security to control a system in a house/organisation (lock or unlock a system with the help of SMS/app) from remote locations. The complete system is designed considering all types of door locks and lockers by providing a simple, effective ease of installation, to provide homes/organisations extreme security and our system will be a means for preventing, detecting and counter-measuring robbery or burglary.
在我们的日常生活中,安全系统的使用突然呈指数增长。例如,商业空间、组织或银行储物柜的安全现在对每个人都很重要。最近,为了在组织中建立安全可靠的场所,正在使用安全摄像头。然而,这项技术需要一个人定期检测从相机拍摄的画面中的任何问题。本文的主要目的是对传统的安全系统进行改进。基于物联网平台的安全系统具有与设备实时交互的潜力。该系统由摄像头、语音传感器/麦克风、运动/活动传感器和LTE/Wi-Fi模块组成,该模块与系统的核心处理器接口。实时使用物联网的整个经济系统将允许移动设备和计算机远程跟踪物联网设备所在位置发生的活动,并记录所有活动,这些活动将保存在一个人的云存储帐户上。基于物联网的安全系统有助于增加用户/客户财产的保护。安全系统被设计成在安全区域被破坏时执行特定的任务。在本文中,通知作为警报发送给相关人员,用户可以采取必要的操作。该系统的主要优点是能够全天候远程管理自己的财产。有了这个基于物联网的智能储物柜,人们可以在世界任何地方通过云连接使用移动应用程序进行监控,获取警报,在紧急情况下发出通知。具体来说,我们的目标是设计一个轻量化,低成本,可扩展,灵活的无线智能安防系统,利用物联网,采用各种最新技术的集成。各种技术的组合可以协同使用,作为智能安全,从远程位置控制房屋/组织中的系统(通过短信/应用程序锁定或解锁系统)。整个系统的设计考虑了所有类型的门锁和储物柜,提供简单有效的安装方便,为家庭/机构提供极高的安全性,我们的系统将成为预防、侦查和对抗抢劫或入室盗窃的一种手段。
{"title":"Smart Security System for Businesses using Internet of Things (IoT)","authors":"Santosh Mahendra, Mithileysh Sathiyanarayanan, R. Vasu","doi":"10.1109/ICGCIOT.2018.8753101","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753101","url":null,"abstract":"There is a sudden exponential use of security systems in our day to day life. For example, security in a business space, organisation, or bank locker is important to every individual now. Lately, security cameras are being utilized in order to build safe and secure places in organisations. However, this technology needs a person regularly to detect any problem in the frame taken from the camera. The main aim of this paper is to enhance the traditional security system. The security system based on the IoT platform has the potential of interacting real-time with the device. The system consists of a camera, voice sensor/microphone, motion/activity sensor and an LTE/Wi-Fi module which is interfaced with the heart of the system, processor. This entire economic system using IoT in real-time will allow mobile devices and computers to remotely track the activities occurring at the location where the IoT device is placed and records all the activities, which will be saved on one’s cloud storage account. The IoT based security system helps in added protection of the user/customer property. Security systems are designed to perform certain tasks when a secured zone is breached. In this paper, notification is sent to the concerned person as an alert where the user can take necessary actions. The main advantage of this system is the ability to remotely manage one’s property 24/7. With this IoT based smart locker, one can monitor, get alerts, notify in case of emergency from anywhere in the world using mobile application via cloud connectivity 24/7. To be specific, we aim to design a light-weight, low cost, extensible, flexible wireless smart security system using IoT which employs the integration of various latest technologies. The combination of the various technologies can be used synergistically as a smart security to control a system in a house/organisation (lock or unlock a system with the help of SMS/app) from remote locations. The complete system is designed considering all types of door locks and lockers by providing a simple, effective ease of installation, to provide homes/organisations extreme security and our system will be a means for preventing, detecting and counter-measuring robbery or burglary.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of Sentiments for Sports data using RapidMiner 使用RapidMiner对体育数据进行情感分析
Tanuj Pawar, Parul Kalra, D. Mehrotra
Sentiment analysis basically consist of determining and categorizing opinions expressed on the basis of computational text. It helps us to determine user’s attitude towards a specific topic on the basis of positive, neutral and negative. Social media acts as one of the biggest platforms where people express their feelings on variety of issues by writing on websites, blogs, public forums or online groups. Sports nowadays have also become one of the major topics that people discuss on social media. People’s opinions are basically positive, neutral or negative, so only looking at each opinion and coming to a result is very difficult and time consuming. In this research paper, an overall process of feature based sentiment analysis is showcased and opinions of people are analyzed regarding cricket matches using RapidMiner.
情感分析主要是在计算文本的基础上对表达的观点进行确定和分类。它帮助我们在积极、中立和消极的基础上确定用户对特定话题的态度。社交媒体是最大的平台之一,人们通过在网站、博客、公共论坛或在线小组上写作来表达他们对各种问题的感受。如今,体育也成为人们在社交媒体上讨论的主要话题之一。人们的意见基本上是积极的,中立的或消极的,所以只看每个意见并得出一个结果是非常困难和耗时的。在本文中,展示了基于特征的情感分析的整体过程,并使用RapidMiner分析了人们对板球比赛的意见。
{"title":"Analysis of Sentiments for Sports data using RapidMiner","authors":"Tanuj Pawar, Parul Kalra, D. Mehrotra","doi":"10.1109/ICGCIOT.2018.8752989","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752989","url":null,"abstract":"Sentiment analysis basically consist of determining and categorizing opinions expressed on the basis of computational text. It helps us to determine user’s attitude towards a specific topic on the basis of positive, neutral and negative. Social media acts as one of the biggest platforms where people express their feelings on variety of issues by writing on websites, blogs, public forums or online groups. Sports nowadays have also become one of the major topics that people discuss on social media. People’s opinions are basically positive, neutral or negative, so only looking at each opinion and coming to a result is very difficult and time consuming. In this research paper, an overall process of feature based sentiment analysis is showcased and opinions of people are analyzed regarding cricket matches using RapidMiner.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126804832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Use Of Telecom Applications For The Cure Of Alzheimer’s Disease 利用电信应用治疗阿尔茨海默病
Vrinda Gupta, N. Chandna, Jitendra Kumar Singh Jadon, Manisha Pant
Alzheimer’s disease is one of the major disease for which will still do not have complete cure. There are many people who are suffering Alzheimer’s and do not have any idea about dealing it in a better way. They are just helpless. This disease is commonly seen in elderly people. Here in this paper, study and survey has been provided about use of telecom applications for the cure of Alzheimer’s disease (AD). Going from very basics about the disease and it causes, introduction about the advance technologies of telecom industry for the treatment and betterment of patients suffering from the disease has been made. It also provides the knowledge about the use of applications in making of required devices and the need of transmission system for the patient to provide a better understanding of the subject. The motive is to provide some light on the connection between the medical system with telecom applications which can lead to new technologies in the field of medical science and help patients to get treated in a better way. We have also discusses about the treatment and curing methods for Alzheimer’s in which it can possibly cured or treated.
阿尔茨海默病是目前尚未完全治愈的主要疾病之一。有许多人患有阿尔茨海默氏症,却不知道如何以更好的方式治疗。他们只是无助。这种病常见于老年人。本文对电信应用在阿尔茨海默病治疗中的应用进行了研究和调查。从最基本的疾病及其病因开始,介绍了电信行业的先进技术,以治疗和改善患者的病情。它还提供了有关在制造所需设备和传输系统的需要中使用应用程序的知识,以便患者更好地了解该主题。其动机是为医疗系统与电信应用之间的联系提供一些光明,这可以导致医学领域的新技术,并帮助患者以更好的方式得到治疗。我们还讨论了阿尔茨海默氏症的治疗和治愈方法,其中可能治愈或治疗。
{"title":"Use Of Telecom Applications For The Cure Of Alzheimer’s Disease","authors":"Vrinda Gupta, N. Chandna, Jitendra Kumar Singh Jadon, Manisha Pant","doi":"10.1109/ICGCIOT.2018.8753006","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753006","url":null,"abstract":"Alzheimer’s disease is one of the major disease for which will still do not have complete cure. There are many people who are suffering Alzheimer’s and do not have any idea about dealing it in a better way. They are just helpless. This disease is commonly seen in elderly people. Here in this paper, study and survey has been provided about use of telecom applications for the cure of Alzheimer’s disease (AD). Going from very basics about the disease and it causes, introduction about the advance technologies of telecom industry for the treatment and betterment of patients suffering from the disease has been made. It also provides the knowledge about the use of applications in making of required devices and the need of transmission system for the patient to provide a better understanding of the subject. The motive is to provide some light on the connection between the medical system with telecom applications which can lead to new technologies in the field of medical science and help patients to get treated in a better way. We have also discusses about the treatment and curing methods for Alzheimer’s in which it can possibly cured or treated.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm 利用模糊关键词增强数据检索,利用Feistal加密算法增强数据安全性
J. Dhamija, Kaumudi Rawat, T. Choudhury, Praveen Kumar
The algorithm proposed is to ensure safety and guarantee of clients information on the cloud. The conventional system of replication based dispersion hence will not be required anymore by using deletion revising code. As the client data increases in size or importance, data repetition is a method to be used to tackle situations like server crashes and more. Client has information and is highly depended on cloud for its retrieval. The current system is of a very high cost and not so efficient. Fuzzy keywords help in searching and providing more probable outcome as a result enhancing the searching efficiency and capability and lower data loss. Also to enhance the security of the data over the cloud, tiny and blowfish algorithms are used to encyrypt data file which are shared over the cloud. For this, an OTP will be generated and entered to access and decrypt the data on receiver end. Information stockpiling nowadays should become more predictable and basic because data is made accessible to client only when required in cases of distributed storage systems. Hence cloud comes into play as in our application we use cloud as the put away stage is now the cloud.
提出的算法是为了保证云上客户端信息的安全与保障。因此,使用删除修正码将不再需要传统的基于复制的分散系统。随着客户机数据的大小或重要性的增加,数据重复是一种用于处理服务器崩溃等情况的方法。客户端拥有信息,并且高度依赖云来获取信息。目前的系统成本很高,效率也不高。模糊关键字有助于搜索和提供更可能的结果,从而提高搜索效率和能力,降低数据丢失。此外,为了提高云上数据的安全性,采用了微小算法和河豚算法对云上共享的数据文件进行加密。为此,将生成并输入OTP以访问和解密接收端上的数据。如今的信息存储应该变得更加可预测和基本,因为在分布式存储系统的情况下,只有在需要时才允许客户端访问数据。因此,在我们的应用程序中,云开始发挥作用,我们使用云作为存储阶段,现在是云。
{"title":"Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm","authors":"J. Dhamija, Kaumudi Rawat, T. Choudhury, Praveen Kumar","doi":"10.1109/ICGCIOT.2018.8752988","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752988","url":null,"abstract":"The algorithm proposed is to ensure safety and guarantee of clients information on the cloud. The conventional system of replication based dispersion hence will not be required anymore by using deletion revising code. As the client data increases in size or importance, data repetition is a method to be used to tackle situations like server crashes and more. Client has information and is highly depended on cloud for its retrieval. The current system is of a very high cost and not so efficient. Fuzzy keywords help in searching and providing more probable outcome as a result enhancing the searching efficiency and capability and lower data loss. Also to enhance the security of the data over the cloud, tiny and blowfish algorithms are used to encyrypt data file which are shared over the cloud. For this, an OTP will be generated and entered to access and decrypt the data on receiver end. Information stockpiling nowadays should become more predictable and basic because data is made accessible to client only when required in cases of distributed storage systems. Hence cloud comes into play as in our application we use cloud as the put away stage is now the cloud.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiband Circularly Polarized Microstrip Reader Antenna for RFID Applications 射频识别应用的多波段圆极化微带阅读器天线
P. M, R. V, Mohammed Riyaz Ahmed
The ability of a thing (in the Internet of Things) to identify itself wirelessly, using Radio Frequency waves makes them Ubiquitous. The ease of Tracking, Monitoring, Identifying and Data capturing can be owed to Radio Frequency IDentification (RFID) Systems. An RFID system consists of Reader and Tag, where they use antennas for transmitting an interrogation signal and identification data respectively. Here we propose a compact microstrip patch antenna for Ultra High Frequency (UHF) and Super High Frequency (SHF). The antenna is triband and operates at 926 MHz of UHF while at 2.48 GHz and 5.8 GHz in Microwave (another name for SHF) band. Beyond RFID applications the microwave band is defined to be used for WLAN applications by IEEE 802.11b and 802.11a standards. The performance analysis of the proposed antenna design shows that it well meets the requirements of the RFID mobile reader.
事物(在物联网中)使用无线射频波无线识别自身的能力使它们无处不在。跟踪,监控,识别和数据捕获的便利性可以归功于射频识别(RFID)系统。RFID系统由阅读器和标签组成,它们分别使用天线传输询问信号和识别数据。在这里,我们提出了一种用于超高频(UHF)和超高频(SHF)的紧凑型微带贴片天线。该天线是三波段的,工作在926 MHz的UHF频段,而在2.48 GHz和5.8 GHz的微波(SHF的另一个名称)频段。除了RFID应用之外,IEEE 802.11b和802.11a标准还定义了微波频段用于WLAN应用。对所提出的天线设计进行了性能分析,结果表明该天线设计能够很好地满足RFID移动阅读器的要求。
{"title":"Multiband Circularly Polarized Microstrip Reader Antenna for RFID Applications","authors":"P. M, R. V, Mohammed Riyaz Ahmed","doi":"10.1109/ICGCIOT.2018.8753027","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753027","url":null,"abstract":"The ability of a thing (in the Internet of Things) to identify itself wirelessly, using Radio Frequency waves makes them Ubiquitous. The ease of Tracking, Monitoring, Identifying and Data capturing can be owed to Radio Frequency IDentification (RFID) Systems. An RFID system consists of Reader and Tag, where they use antennas for transmitting an interrogation signal and identification data respectively. Here we propose a compact microstrip patch antenna for Ultra High Frequency (UHF) and Super High Frequency (SHF). The antenna is triband and operates at 926 MHz of UHF while at 2.48 GHz and 5.8 GHz in Microwave (another name for SHF) band. Beyond RFID applications the microwave band is defined to be used for WLAN applications by IEEE 802.11b and 802.11a standards. The performance analysis of the proposed antenna design shows that it well meets the requirements of the RFID mobile reader.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Genuine ratings for mobile apps with the support of authenticated users’ reviews 在经过认证的用户评论的支持下,对移动应用程序进行真正的评级
K. Manoj, T. Sandeep, Dr. N Sudhakar Reddy, P. Alikhan
Ranking fraud on the mobile app market refers liable to mislead activities which have a purpose of bumping up the apps in popularity list. Because of this, app users have no facility to express their views. This is the same technique in ratings also. It ends up bringing increasing number of visits for application engineers to build the spreading of their application deals or application appraisals to submit the positioning extortion. It mainly provides a view of reviews to impact on the mobile apps or products and also detects the fake review list by the users. There are mainly three evidences to end up plainly mindful of the fraud in the mobile apps, i.e., positioning-based confirmations, rating-based confirmations, and finally review-based evidences. Compared to the remaining two evidences, review-based evidences are most helpful to the users who are trying to download new apps. Here, the main concern is the reviews of the authenticated users, that is, the users who already have an account in that field. And review-based evidences are very crucial. We precisely find the positioning extortion by mining dynamic periods in particular driving sessions for mobile apps and also discuss how the reviews are most useful for the new clients.
手机应用市场中的排名欺诈指的是为了提高应用在热门榜单上的排名而进行的误导活动。因此,应用程序用户无法表达自己的观点。这在评级中也是同样的技术。它最终为应用程序工程师带来了越来越多的访问,以建立他们的应用程序交易的传播或应用程序评估,以提交定位勒索。它主要提供对移动应用或产品的影响的评论视图,并检测用户的虚假评论列表。对于手机应用中的欺诈行为,主要有三种证据,即基于定位的确认,基于评级的确认,最后是基于审查的证据。与其他两种证据相比,基于评论的证据对尝试下载新应用的用户最有帮助。在这里,主要关注的是对经过身份验证的用户的审查,即已经在该字段中拥有帐户的用户。基于评论的证据非常重要。我们通过挖掘移动应用程序的动态时段来精确地发现定位勒索,并讨论评论如何对新客户最有用。
{"title":"Genuine ratings for mobile apps with the support of authenticated users’ reviews","authors":"K. Manoj, T. Sandeep, Dr. N Sudhakar Reddy, P. Alikhan","doi":"10.1109/ICGCIOT.2018.8753068","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753068","url":null,"abstract":"Ranking fraud on the mobile app market refers liable to mislead activities which have a purpose of bumping up the apps in popularity list. Because of this, app users have no facility to express their views. This is the same technique in ratings also. It ends up bringing increasing number of visits for application engineers to build the spreading of their application deals or application appraisals to submit the positioning extortion. It mainly provides a view of reviews to impact on the mobile apps or products and also detects the fake review list by the users. There are mainly three evidences to end up plainly mindful of the fraud in the mobile apps, i.e., positioning-based confirmations, rating-based confirmations, and finally review-based evidences. Compared to the remaining two evidences, review-based evidences are most helpful to the users who are trying to download new apps. Here, the main concern is the reviews of the authenticated users, that is, the users who already have an account in that field. And review-based evidences are very crucial. We precisely find the positioning extortion by mining dynamic periods in particular driving sessions for mobile apps and also discuss how the reviews are most useful for the new clients.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130312784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pomegranate Diseases and Detection using Sensors: A Review 石榴病害及其传感器检测研究进展
S. P, A. A. Deshpande
Technology is advancing at a rapid rate with its presence in every field alongside with humans. In the field of Agriculture, farmers are able to detect diseases in their crops, plants and fruits by making use of various sensors available in the technological market. This paper surveys different diseases in Pomegranate plant and suggests sensors which can be used to detect those diseases.
科技正在飞速发展,它与人类一起出现在各个领域。在农业领域,农民能够利用技术市场上的各种传感器检测作物、植物和水果中的疾病。本文对石榴植物的病害进行了调查,并提出了用于检测病害的传感器。
{"title":"Pomegranate Diseases and Detection using Sensors: A Review","authors":"S. P, A. A. Deshpande","doi":"10.1109/ICGCIOT.2018.8753062","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753062","url":null,"abstract":"Technology is advancing at a rapid rate with its presence in every field alongside with humans. In the field of Agriculture, farmers are able to detect diseases in their crops, plants and fruits by making use of various sensors available in the technological market. This paper surveys different diseases in Pomegranate plant and suggests sensors which can be used to detect those diseases.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iot Based Smart Shopping Mall 基于物联网的智能购物中心
A. Sutagundar, Masuda Ettinamani, Ameenabegum H. Attar
In present area, going to supermarkets for shopping is increasing rapidly. In the Shopping mall, people get their daily essential products like consumer goods, clothes, and foodstuff. At the time of festivals and offers, there is a huge rush in the shopping mall. In shopping mall or supermarket, they are using barcode technique for billing the products. It takes lot of time and customer has to wait till all products get scanned to generate the bill. To avoid this situation, we proposed IoT based smart shopping mall. It consists of RFID tag, LCD display, android application, Wi-Fi and cloud. All products present in the shopping mall will be tagged with RFID. Customer’s required products will be put in the trolley, where its code will be detected using RFID and name of the product and cost will be displayed on the LCD. Data is pushed to the amazon cloud using Wi-Fi module ESP8266 and the data is sent to Android App of the Customers. Total billing is done by wireless modules. We are providing a searching option for the customers to know the availability and unavailability of products in the shopping mall.
在当前地区,去超市购物的人数迅速增加。在购物中心,人们购买日常必需品,如消费品、衣服和食品。每逢节日和打折的时候,购物中心里总是人潮涌动。在购物中心或超市,他们正在使用条形码技术对产品进行计费。这需要花费很多时间,客户必须等到所有产品都被扫描后才能生成账单。为了避免这种情况,我们提出了基于物联网的智能购物中心。它由RFID标签、LCD显示屏、android应用、Wi-Fi和云组成。商场里的所有产品都将贴上射频识别标签。顾客需要的产品将被放入小车中,小车将使用RFID检测其代码,并在LCD上显示产品名称和成本。数据通过Wi-Fi模块ESP8266推送至亚马逊云,并发送至客户安卓App。总账单由无线模块完成。我们为客户提供了一个搜索选项,以了解商场中产品的可用性和不可用性。
{"title":"Iot Based Smart Shopping Mall","authors":"A. Sutagundar, Masuda Ettinamani, Ameenabegum H. Attar","doi":"10.1109/ICGCIOT.2018.8752971","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752971","url":null,"abstract":"In present area, going to supermarkets for shopping is increasing rapidly. In the Shopping mall, people get their daily essential products like consumer goods, clothes, and foodstuff. At the time of festivals and offers, there is a huge rush in the shopping mall. In shopping mall or supermarket, they are using barcode technique for billing the products. It takes lot of time and customer has to wait till all products get scanned to generate the bill. To avoid this situation, we proposed IoT based smart shopping mall. It consists of RFID tag, LCD display, android application, Wi-Fi and cloud. All products present in the shopping mall will be tagged with RFID. Customer’s required products will be put in the trolley, where its code will be detected using RFID and name of the product and cost will be displayed on the LCD. Data is pushed to the amazon cloud using Wi-Fi module ESP8266 and the data is sent to Android App of the Customers. Total billing is done by wireless modules. We are providing a searching option for the customers to know the availability and unavailability of products in the shopping mall.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Way to Detect Credit Card Fraud Using Machine Learning Methodologies 使用机器学习方法检测信用卡欺诈的有效方法
T. Choudhury, Gaurav Dangi, T. Singh, Abhinav Chauhan, Archit Aggarwal
Attempted use of combinations of machine learning techniques to detect credit card fraud is presented in this paper. Credit card fraud is increasing day by day every year on a large scale, which results in great loss to organizations, this paper proposes a model to predict whether the credit card presented is fraudulent or not determined by more than 150 attributes per visitor, which have been trained before hand with a dataset. As the data used for the purposes of this paper was highly imbalanced, different sampling techniques have been used to balance the training data. The experiment shows good performance along with accuracy in fraud detection.
本文介绍了尝试使用机器学习技术的组合来检测信用卡欺诈。信用卡欺诈每年都在大规模地增加,给组织带来了巨大的损失,本文提出了一个模型来预测所呈现的信用卡是否欺诈,该模型由每个访问者超过150个属性来确定,该模型事先使用数据集进行训练。由于本文使用的数据高度不平衡,因此使用了不同的采样技术来平衡训练数据。实验表明,该方法在欺诈检测中具有良好的性能和准确性。
{"title":"An Efficient Way to Detect Credit Card Fraud Using Machine Learning Methodologies","authors":"T. Choudhury, Gaurav Dangi, T. Singh, Abhinav Chauhan, Archit Aggarwal","doi":"10.1109/ICGCIOT.2018.8753077","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753077","url":null,"abstract":"Attempted use of combinations of machine learning techniques to detect credit card fraud is presented in this paper. Credit card fraud is increasing day by day every year on a large scale, which results in great loss to organizations, this paper proposes a model to predict whether the credit card presented is fraudulent or not determined by more than 150 attributes per visitor, which have been trained before hand with a dataset. As the data used for the purposes of this paper was highly imbalanced, different sampling techniques have been used to balance the training data. The experiment shows good performance along with accuracy in fraud detection.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1