首页 > 最新文献

2022 International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Internet of Things and Cloud Computing Involvement Microsoft Azure Platform 物联网和云计算参与微软Azure平台
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936126
Sreyes K, Anushka Xavier K, Dona Davis, N. Jayapandian
The rapid advancement of cloud technology has resulted in the emergence of many cloud service providers. Microsoft Azure is one among them to provide a flexible cloud computing platform that can scale business to exceptional heights. It offers extensive cloud services and is compatible with a wide range of developer tools, databases, and operating systems. In this paper, a detailed analysis of Microsoft Azure in the cloud computing era is performed. For this reason, the three significant Azure services, namely, the Azure AI (Artificial Intelligence) and Machine Learning (ML) Service, Azure Analytics Service and Internet of Things (IoT) are investigated. The paper briefs on the Azure Cognitive Search and Face Service under AI and ML service and explores this service's architecture and security measures. The proposed study also surveys the Data Lake and Data factory Services under Azure Analytics Service. Subsequently, an overview of Azure IoT service, mainly IoT Hub and IoT Central, is discussed. Along with Microsoft Azure, other providers in the market are Google Compute Engine and Amazon Web Service. The paper compares and contrasts each cloud service provider based on their computing capability.
云技术的快速发展导致了许多云服务提供商的出现。微软Azure就是其中之一,它提供了一个灵活的云计算平台,可以将业务扩展到非凡的高度。它提供了广泛的云服务,并与广泛的开发人员工具、数据库和操作系统兼容。本文对云计算时代的Microsoft Azure进行了详细的分析。出于这个原因,我们研究了三个重要的Azure服务,即Azure AI(人工智能)和机器学习(ML)服务,Azure分析服务和物联网(IoT)。本文简要介绍了人工智能和机器学习服务下的Azure认知搜索和面部服务,并探讨了该服务的架构和安全措施。该研究还调查了Azure Analytics Service下的数据湖和数据工厂服务。随后,概述了Azure物联网服务,主要是IoT Hub和IoT Central。除了微软Azure,市场上的其他供应商还有谷歌计算引擎和亚马逊网络服务。本文对各云服务提供商的计算能力进行了比较和对比。
{"title":"Internet of Things and Cloud Computing Involvement Microsoft Azure Platform","authors":"Sreyes K, Anushka Xavier K, Dona Davis, N. Jayapandian","doi":"10.1109/ICECAA55415.2022.9936126","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936126","url":null,"abstract":"The rapid advancement of cloud technology has resulted in the emergence of many cloud service providers. Microsoft Azure is one among them to provide a flexible cloud computing platform that can scale business to exceptional heights. It offers extensive cloud services and is compatible with a wide range of developer tools, databases, and operating systems. In this paper, a detailed analysis of Microsoft Azure in the cloud computing era is performed. For this reason, the three significant Azure services, namely, the Azure AI (Artificial Intelligence) and Machine Learning (ML) Service, Azure Analytics Service and Internet of Things (IoT) are investigated. The paper briefs on the Azure Cognitive Search and Face Service under AI and ML service and explores this service's architecture and security measures. The proposed study also surveys the Data Lake and Data factory Services under Azure Analytics Service. Subsequently, an overview of Azure IoT service, mainly IoT Hub and IoT Central, is discussed. Along with Microsoft Azure, other providers in the market are Google Compute Engine and Amazon Web Service. The paper compares and contrasts each cloud service provider based on their computing capability.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object Detection in Unmanned Aerial Vehicle (UAV) Images using YOLOv5 with Supervised Spatial Attention Module 基于监督空间注意模块的YOLOv5无人机图像目标检测
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936382
Museboyina Sirisha, S. Sudha
There have been various object detection models developed recently that have enabled better results in object detection. Object detection has gradually increased in computer vision with further development of application areas. Unmanned aerial vehicle (UAV) images feature smaller and more fragmented objects, as opposed to landscape images where objects occupy more space. Furthermore, rotational and measuremental factors reduce object detection accuracy. In this paper, an improved object detection framework based on YOLOv5 is proposed in order to resolve these issues. As such, this study proposes SSAM-Darknet for the detection of UAV images based on objects. SSAM-Darknet and Bi-FPN are used to extract multiscale and multilevel features from the input images. Additionally, dilated convolution and the Ada-bound optimizer are employed to enhance the proposed model in detecting the objects from UAV images. This experiment evaluates the accuracy of object detection by using VisDrone-DET. AP (Average Precision) and AR (Average Recall) metrics are proposed as a quantitative way of evaluating detection performance. The proposed model achieves an average precision of 34.32 making an increase in detection accuracy by 10% compared to other detectors.
最近开发了各种各样的目标检测模型,使目标检测的结果更好。随着计算机视觉应用领域的进一步发展,目标检测逐渐增多。无人机(UAV)图像具有更小和更碎片化的物体,而不是物体占据更多空间的景观图像。此外,旋转和测量因素降低了目标检测精度。为了解决这些问题,本文提出了一种基于YOLOv5的改进目标检测框架。因此,本研究提出了基于物体的无人机图像检测SSAM-Darknet。利用SSAM-Darknet和Bi-FPN从输入图像中提取多尺度、多水平特征。此外,利用展开卷积和数据界优化器增强了该模型对无人机图像目标的检测能力。本实验对使用VisDrone-DET进行目标检测的精度进行了评价。AP(平均精度)和AR(平均召回率)指标被提出作为评估检测性能的定量方法。该模型的平均精度为34.32,与其他检测器相比,检测精度提高了10%。
{"title":"Object Detection in Unmanned Aerial Vehicle (UAV) Images using YOLOv5 with Supervised Spatial Attention Module","authors":"Museboyina Sirisha, S. Sudha","doi":"10.1109/ICECAA55415.2022.9936382","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936382","url":null,"abstract":"There have been various object detection models developed recently that have enabled better results in object detection. Object detection has gradually increased in computer vision with further development of application areas. Unmanned aerial vehicle (UAV) images feature smaller and more fragmented objects, as opposed to landscape images where objects occupy more space. Furthermore, rotational and measuremental factors reduce object detection accuracy. In this paper, an improved object detection framework based on YOLOv5 is proposed in order to resolve these issues. As such, this study proposes SSAM-Darknet for the detection of UAV images based on objects. SSAM-Darknet and Bi-FPN are used to extract multiscale and multilevel features from the input images. Additionally, dilated convolution and the Ada-bound optimizer are employed to enhance the proposed model in detecting the objects from UAV images. This experiment evaluates the accuracy of object detection by using VisDrone-DET. AP (Average Precision) and AR (Average Recall) metrics are proposed as a quantitative way of evaluating detection performance. The proposed model achieves an average precision of 34.32 making an increase in detection accuracy by 10% compared to other detectors.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Recognition of Alzheimer Disease using Brain MRI Images with DPNMM through Adaptive Model 基于自适应模型的DPNMM脑MRI图像识别阿尔茨海默病
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936395
M. Sudharsan, G. Thailambal
The most important area of digital image processing is biomedical image processing, which combines the Artificial Intelligence empowered learning Has been included algorithms to rapidly detect diseases. History's philosophy of biomedical image processing has advanced significantly, and the combination of potent deep learning and classification approaches offers a wide range of opportunities for illness prediction. In order to pinpoint the most serious brain-related disease, Alzheimer's, this study will develop a revolutionary disease prediction technique. This illness has a significant negative effect on the human brain and causes affected people to lose their memories permanently along with other cognitive impairments. surrounding brain cell region. In this the protein named amyloid is the main cause of such diseases, in which it aggregates over the brain cell region to generate plaques. Another important protein called Tau, it also aggregates on the brain cell region to lead to Alzheimer disease. In this paper, a novel deep learning strategy is introduced to identify the Alzheimer Disease using deep learning strategy, which is called Deep polynomial network with many models (DPNMM). This suggested method, called DPNMM, detects Alzheimer's disease through neuro-imaging data that is obtained through the use of scanning tools like Magnetic Resonance Imaging (MRI). Morphological Image Processing Techniques which have been applied In this study, temporal MRI scans with regard to 150 patient records with ages ranging from 60 to 96 are used .The Data set is Contain 65 Attributes Like Pixel Values,Entrophy,Contrast etc.They are part of an open source dataset made accessible through Kaggle repository. In the methods portion of this work, a brief description of the dataset and its definition will be provided.Based on this dataset the overall functionality is moving around and the processing is carried forward through the following way including Image Preprocessing, Normalization, Feature Selection and Classification. The proposed system efficiency is proved in terms of graphical emulations over the resulting section of this paper. For all the proposed learning strategy called Deep polynomial network with many models provides sufficient efficiency to identify the Alzheimer disease in perfect ratio and the resulting section has a proper proof for that in clear manner.
数字图像处理最重要的领域是生物医学图像处理,它结合了人工智能授权的学习,包括快速检测疾病的算法。生物医学图像处理的历史哲学有了显著的进步,强大的深度学习和分类方法的结合为疾病预测提供了广泛的机会。为了精确定位最严重的脑相关疾病——阿尔茨海默病,本研究将开发一种革命性的疾病预测技术。这种疾病对人类大脑有显著的负面影响,导致患者永久失去记忆以及其他认知障碍。周围的脑细胞区域。在这种情况下,被称为淀粉样蛋白的蛋白质是导致这些疾病的主要原因,它聚集在脑细胞区域产生斑块。另一种重要的蛋白质叫做Tau,它也聚集在脑细胞区域,导致阿尔茨海默病。本文提出了一种新的深度学习策略,即多模型深度多项式网络(deep polynomial network with many models, DPNMM)来识别阿尔茨海默病。这种建议的方法被称为DPNMM,通过使用磁共振成像(MRI)等扫描工具获得的神经成像数据来检测阿尔茨海默病。形态学图像处理技术在本研究中得到了应用,使用了150例年龄从60岁到96岁的患者的颞MRI扫描。数据集包含65个属性,如像素值、熵、对比度等。它们是一个开源数据集的一部分,可以通过Kaggle存储库访问。在本工作的方法部分,将提供数据集及其定义的简要描述。在此数据集的基础上进行整体功能的移动,并通过图像预处理、归一化、特征选择和分类等方式进行处理。本文最后通过图形仿真验证了系统的有效性。所提出的学习策略称为多模型深度多项式网络,提供了足够的效率,以完美的比率识别阿尔茨海默病,所得截面对此有适当的证明。
{"title":"An Recognition of Alzheimer Disease using Brain MRI Images with DPNMM through Adaptive Model","authors":"M. Sudharsan, G. Thailambal","doi":"10.1109/ICECAA55415.2022.9936395","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936395","url":null,"abstract":"The most important area of digital image processing is biomedical image processing, which combines the Artificial Intelligence empowered learning Has been included algorithms to rapidly detect diseases. History's philosophy of biomedical image processing has advanced significantly, and the combination of potent deep learning and classification approaches offers a wide range of opportunities for illness prediction. In order to pinpoint the most serious brain-related disease, Alzheimer's, this study will develop a revolutionary disease prediction technique. This illness has a significant negative effect on the human brain and causes affected people to lose their memories permanently along with other cognitive impairments. surrounding brain cell region. In this the protein named amyloid is the main cause of such diseases, in which it aggregates over the brain cell region to generate plaques. Another important protein called Tau, it also aggregates on the brain cell region to lead to Alzheimer disease. In this paper, a novel deep learning strategy is introduced to identify the Alzheimer Disease using deep learning strategy, which is called Deep polynomial network with many models (DPNMM). This suggested method, called DPNMM, detects Alzheimer's disease through neuro-imaging data that is obtained through the use of scanning tools like Magnetic Resonance Imaging (MRI). Morphological Image Processing Techniques which have been applied In this study, temporal MRI scans with regard to 150 patient records with ages ranging from 60 to 96 are used .The Data set is Contain 65 Attributes Like Pixel Values,Entrophy,Contrast etc.They are part of an open source dataset made accessible through Kaggle repository. In the methods portion of this work, a brief description of the dataset and its definition will be provided.Based on this dataset the overall functionality is moving around and the processing is carried forward through the following way including Image Preprocessing, Normalization, Feature Selection and Classification. The proposed system efficiency is proved in terms of graphical emulations over the resulting section of this paper. For all the proposed learning strategy called Deep polynomial network with many models provides sufficient efficiency to identify the Alzheimer disease in perfect ratio and the resulting section has a proper proof for that in clear manner.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Spotted Hyena Optimizer-enabled Deep QNN for Laryngeal Cancer Classification 基于斑点鬣狗优化器的喉癌分类深度QNN
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936500
M. N. Sachane, S. A. Patil
Laryngeal Cancer (LCA) is one of the predominant cancers found commonly among people around world that affects the head and neck region of humans. The change in patient’s voice is the early symptom of LCA and diagnosis the LCA at the primary stages is necessary to decrease the morbidity rate. Usage of laryngeal endoscopic images for automatic laryngeal cancer detection is advantageous in additional evaluation of the tumor structures and its characteristics enable to improve the quality of treatment, like computed aided surgery. Though, only fewer methods exist for detecting laryngeal cancer automatically, but increasing the performance still results a major challenge. In order to detect the laryngeal cancer automatically, this research proposes an effectual model for laryngeal cancer classification using proposed Adaptive Spotted Hyena Optimizer-based Deep Quantum Neural Network (ASHO-based Deep QNN). Here, the pre-processing is effectively done using Gaussian filtering and features, such as Spider Local Image Feature (SLIF), Gradient Binary Pattern (GBP), and Histogram of Gradients (HOG) are refined efficiently to enhance the performance of the model. Finally, classification is accomplished with the Deep QNN, wherein the introduced ASHO is made use of to tune the network classifier. The ASHO is devised by inheriting the benefits of Adaptive concept with Spotted Hyena Optimizer (SHO). Meanwhile, the proposed ASHO-based Deep QNN has achieved maximum values of accuracy, sensitivity, as well as specificity at 0.948, 0.952, and 0.924, respectively.
喉癌(LCA)是世界上常见的影响人类头颈部的主要癌症之一。患者的声音变化是LCA的早期症状,早期诊断LCA是降低发病率的必要条件。使用喉内窥镜图像进行喉癌自动检测,有利于对肿瘤结构及其特征进行额外评估,从而提高治疗质量,如计算机辅助手术。虽然目前用于喉癌自动检测的方法较少,但提高其性能仍然是一个重大挑战。为了自动检测喉癌,本研究提出了一种基于自适应斑点鬣狗优化器的深度量子神经网络(ASHO-based Deep QNN)的有效喉癌分类模型。该模型采用高斯滤波进行有效预处理,并对蜘蛛局部图像特征(SLIF)、梯度二值模式(GBP)和梯度直方图(HOG)等特征进行有效细化,提高了模型的性能。最后,使用深度QNN完成分类,其中使用引入的ASHO来调整网络分类器。ASHO是继承了斑点鬣狗优化器(spot Hyena Optimizer, SHO)自适应概念的优点而设计的。同时,本文提出的基于asho的Deep QNN的准确率、灵敏度和特异性分别达到了最大值0.948、0.952和0.924。
{"title":"Adaptive Spotted Hyena Optimizer-enabled Deep QNN for Laryngeal Cancer Classification","authors":"M. N. Sachane, S. A. Patil","doi":"10.1109/ICECAA55415.2022.9936500","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936500","url":null,"abstract":"Laryngeal Cancer (LCA) is one of the predominant cancers found commonly among people around world that affects the head and neck region of humans. The change in patient’s voice is the early symptom of LCA and diagnosis the LCA at the primary stages is necessary to decrease the morbidity rate. Usage of laryngeal endoscopic images for automatic laryngeal cancer detection is advantageous in additional evaluation of the tumor structures and its characteristics enable to improve the quality of treatment, like computed aided surgery. Though, only fewer methods exist for detecting laryngeal cancer automatically, but increasing the performance still results a major challenge. In order to detect the laryngeal cancer automatically, this research proposes an effectual model for laryngeal cancer classification using proposed Adaptive Spotted Hyena Optimizer-based Deep Quantum Neural Network (ASHO-based Deep QNN). Here, the pre-processing is effectively done using Gaussian filtering and features, such as Spider Local Image Feature (SLIF), Gradient Binary Pattern (GBP), and Histogram of Gradients (HOG) are refined efficiently to enhance the performance of the model. Finally, classification is accomplished with the Deep QNN, wherein the introduced ASHO is made use of to tune the network classifier. The ASHO is devised by inheriting the benefits of Adaptive concept with Spotted Hyena Optimizer (SHO). Meanwhile, the proposed ASHO-based Deep QNN has achieved maximum values of accuracy, sensitivity, as well as specificity at 0.948, 0.952, and 0.924, respectively.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis using K - Nearest Neighbour with Artificial Neural Network to Improve Accuracy for Predicting Road Accidents 利用K近邻与人工神经网络的比较分析提高道路交通事故预测的准确性
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936227
T. D. Prakash, Nagaraju V
The purpose of this study is to use machine learning approaches to improve the accuracy of modern road accident prediction systems like the K-Nearest Neighbour Algorithm and Artificial Neural Networks Algorithm. Materials and techniques used include the K-Nearest Neighbour technique and the Artificial Neural Networks algorithm with sample size N=10, iterated 20 times in parallel to test the accuracy of forecasting road accidents. p0.05 indicates the significance of the K-Nearest Neighbour method. When comparing the results of the two algorithms, it is discovered that the K-Nearest Neighbour approach (81.22%) outperforms the Artificial Neural Networks algorithm (69.22%) in terms of accuracy in forecasting road accidents.
本研究的目的是使用机器学习方法来提高现代道路事故预测系统的准确性,如k近邻算法和人工神经网络算法。使用的材料和技术包括k近邻技术和人工神经网络算法,样本量N=10,并行迭代20次以测试预测道路事故的准确性。p0.05表示k近邻方法显著性。对比两种算法的结果发现,在预测道路事故的准确率方面,k -最近邻方法(81.22%)优于人工神经网络算法(69.22%)。
{"title":"Comparative Analysis using K - Nearest Neighbour with Artificial Neural Network to Improve Accuracy for Predicting Road Accidents","authors":"T. D. Prakash, Nagaraju V","doi":"10.1109/ICECAA55415.2022.9936227","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936227","url":null,"abstract":"The purpose of this study is to use machine learning approaches to improve the accuracy of modern road accident prediction systems like the K-Nearest Neighbour Algorithm and Artificial Neural Networks Algorithm. Materials and techniques used include the K-Nearest Neighbour technique and the Artificial Neural Networks algorithm with sample size N=10, iterated 20 times in parallel to test the accuracy of forecasting road accidents. p0.05 indicates the significance of the K-Nearest Neighbour method. When comparing the results of the two algorithms, it is discovered that the K-Nearest Neighbour approach (81.22%) outperforms the Artificial Neural Networks algorithm (69.22%) in terms of accuracy in forecasting road accidents.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Federated Learning Approach for Tracking Malicious Activities in Cyber-Physical Systems 网络物理系统中恶意活动跟踪的联邦学习方法
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936285
Chandu Jagan Sekhar Madala, G. H. K. Yadav, S. Sivakumar, R. Nithya, M. M., M. Deivakani
The fast rise of the Internet and advanced technologies causes an increase in network traffic, making network infrastructure increasingly complicated and varied. Mobile phones, wearable gadgets, and driverless cars are all instances of dispersed networks that create massive amounts of data every day. The processing capability of these devices has also increased steadily, necessitating the need to transport data, store data locally, and direct network calculations to edge devices. Intrusion detection systems are essential in guaranteeing the safety and confidentiality of such equipment. Deep Learning (DL) combined Intrusion Detection Systems (IDS) have gained prominence due to their excellent categorization accuracy. However, the requirement to store and communicate data to a centralized server may jeopardize privacy and security concerns. Federated learning (FL), on the other hand, fits in nicely as private information decentralized learning approach that does not transport data but instead trains algorithms locally and sends the parameters to a centralized server. This work targets to offer an extensive overview of the FL in intrusion detection systems.
互联网和先进技术的快速崛起,导致网络流量的增加,使得网络基础设施日益复杂化和多样化。手机、可穿戴设备和无人驾驶汽车都是分散网络的实例,这些网络每天都会产生大量数据。这些设备的处理能力也在稳步提高,因此需要传输数据、本地存储数据,并将网络计算直接分配给边缘设备。入侵检测系统对于保证此类设备的安全性和保密性至关重要。深度学习(DL)结合入侵检测系统(IDS)因其出色的分类精度而备受关注。然而,将数据存储和通信到集中式服务器的需求可能会危及隐私和安全问题。另一方面,联邦学习(FL)非常适合作为私有信息分散学习方法,它不传输数据,而是在本地训练算法并将参数发送到集中式服务器。这项工作的目标是提供入侵检测系统中FL的广泛概述。
{"title":"Federated Learning Approach for Tracking Malicious Activities in Cyber-Physical Systems","authors":"Chandu Jagan Sekhar Madala, G. H. K. Yadav, S. Sivakumar, R. Nithya, M. M., M. Deivakani","doi":"10.1109/ICECAA55415.2022.9936285","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936285","url":null,"abstract":"The fast rise of the Internet and advanced technologies causes an increase in network traffic, making network infrastructure increasingly complicated and varied. Mobile phones, wearable gadgets, and driverless cars are all instances of dispersed networks that create massive amounts of data every day. The processing capability of these devices has also increased steadily, necessitating the need to transport data, store data locally, and direct network calculations to edge devices. Intrusion detection systems are essential in guaranteeing the safety and confidentiality of such equipment. Deep Learning (DL) combined Intrusion Detection Systems (IDS) have gained prominence due to their excellent categorization accuracy. However, the requirement to store and communicate data to a centralized server may jeopardize privacy and security concerns. Federated learning (FL), on the other hand, fits in nicely as private information decentralized learning approach that does not transport data but instead trains algorithms locally and sends the parameters to a centralized server. This work targets to offer an extensive overview of the FL in intrusion detection systems.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Framework of Rural Tourism Marketing Big Data Mining based on PHP Algorithm of Intelligent Ledger System 基于智能账本系统PHP算法的乡村旅游营销大数据挖掘智能框架
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936424
Huanhuan Fan
Design and develop a ledger system based on the front-end and back-end separation architecture. The system adopts the design concept of mobile first, and deeply customizes the functions and user interface for smart phones. Based on this, this paper briefly introduces the definition of rural ecotourism, analyzes the current situation of rural ecotourism marketing in my country, and proposes the precision of rural ecotourism in the big data environment. Marketing strategy to help the development of rural ecotourism in my country. The regional differences and dispersion of WeChat marketing performance are large, and the online customer relationship is dominated by positive emotions. It aims to create social and economic value from rural social big data, implement big data-driven precision marketing innovation strategies, enhance the competitiveness of rural digital economy, and promote rural smart growth and regional coordination and sustainable development.
设计并开发了一个基于前端与后端分离架构的账本系统。系统采用移动优先的设计理念,对智能手机的功能和用户界面进行了深度定制。在此基础上,本文简要介绍了乡村生态旅游的定义,分析了我国乡村生态旅游营销的现状,提出了大数据环境下乡村生态旅游的精准化。营销策略助力我国乡村生态旅游的发展。微信营销绩效的地域差异和分散性较大,在线客户关系以积极情绪为主。旨在通过农村社会大数据创造社会经济价值,实施大数据驱动的精准营销创新战略,提升农村数字经济竞争力,促进农村智慧增长和区域协调可持续发展。
{"title":"Intelligent Framework of Rural Tourism Marketing Big Data Mining based on PHP Algorithm of Intelligent Ledger System","authors":"Huanhuan Fan","doi":"10.1109/ICECAA55415.2022.9936424","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936424","url":null,"abstract":"Design and develop a ledger system based on the front-end and back-end separation architecture. The system adopts the design concept of mobile first, and deeply customizes the functions and user interface for smart phones. Based on this, this paper briefly introduces the definition of rural ecotourism, analyzes the current situation of rural ecotourism marketing in my country, and proposes the precision of rural ecotourism in the big data environment. Marketing strategy to help the development of rural ecotourism in my country. The regional differences and dispersion of WeChat marketing performance are large, and the online customer relationship is dominated by positive emotions. It aims to create social and economic value from rural social big data, implement big data-driven precision marketing innovation strategies, enhance the competitiveness of rural digital economy, and promote rural smart growth and regional coordination and sustainable development.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks 一种独特的检测复杂攻击的深度入侵检测方法
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936156
P. V. Krishna, Venkata Durgarao Matta
Intrusion Detection System (IDS) is one of the applications to detect intrusions in the network. IDS aims to detect any malicious activities that protect the computer networks from unknown persons or users called attackers. Network security is one of the significant tasks that should provide secure data transfer. Virtualization of networks becomes more complex for IoT technology. Deep Learning (DL) is most widely used by many networks to detect the complex patterns. This is very suitable approaches for detecting the malicious nodes or attacks. Software-Defined Network (SDN) is the default virtualization computer network. Attackers are developing new technology to attack the networks. Many authors are trying to develop new technologies to attack the networks. To overcome these attacks new protocols are required to prevent these attacks. In this paper, a unique deep intrusion detection approach (UDIDA) is developed to detect the attacks in SDN. Performance shows that the proposed approach is achieved more accuracy than existing approaches.
入侵检测系统(IDS)是检测网络入侵的应用之一。IDS旨在检测任何恶意活动,以保护计算机网络免受未知人员或称为攻击者的用户的攻击。网络安全是提供安全数据传输的重要任务之一。对于物联网技术来说,网络虚拟化变得更加复杂。深度学习(Deep Learning, DL)被广泛应用于网络的复杂模式检测。这是一种非常适合检测恶意节点或攻击的方法。SDN (Software-Defined Network)是默认的虚拟化计算机网络。攻击者正在开发攻击网络的新技术。许多作者正试图开发攻击网络的新技术。为了克服这些攻击,需要新的协议来防止这些攻击。本文提出了一种独特的深度入侵检测方法(UDIDA)来检测SDN中的攻击。性能表明,该方法比现有方法具有更高的精度。
{"title":"A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks","authors":"P. V. Krishna, Venkata Durgarao Matta","doi":"10.1109/ICECAA55415.2022.9936156","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936156","url":null,"abstract":"Intrusion Detection System (IDS) is one of the applications to detect intrusions in the network. IDS aims to detect any malicious activities that protect the computer networks from unknown persons or users called attackers. Network security is one of the significant tasks that should provide secure data transfer. Virtualization of networks becomes more complex for IoT technology. Deep Learning (DL) is most widely used by many networks to detect the complex patterns. This is very suitable approaches for detecting the malicious nodes or attacks. Software-Defined Network (SDN) is the default virtualization computer network. Attackers are developing new technology to attack the networks. Many authors are trying to develop new technologies to attack the networks. To overcome these attacks new protocols are required to prevent these attacks. In this paper, a unique deep intrusion detection approach (UDIDA) is developed to detect the attacks in SDN. Performance shows that the proposed approach is achieved more accuracy than existing approaches.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Autonomous Cars using Machine Learning 使用机器学习实现自动驾驶汽车
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936102
Someswari Perla, N. K, Srinidhi Potta
In crowded countries like India, traffic problems are a big issue because of the large population. So, autonomous driving is becoming increasingly common and has the potential to disrupt our transportation system. In addition, self-driving cars are on their way to becoming legal, but they are still not safe enough to be used in the real world due to a lack of trust. The purpose of this survey is to describe an em-pirical study on the implementation of autonomous vehicles using machine learning algorithms. Different algorithms are used in the implementation of self-driving cars. Accuracy is used as the evaluation metric. Road Lane Detection, Support Vector Machine(SVM) for anomalies detection, and Disparity Map was used as the algorithms. From the experimental analysis, this research study has observed that these machine learning models have taken less time for processing images autonomously with model accuracies of 97% for road lane detection, and SVM has shown 98% of accuracy for anomaly detection. The proposed models have outperformed baseline models with a significant difference.
在像印度这样人口拥挤的国家,由于人口众多,交通问题是一个大问题。因此,自动驾驶正变得越来越普遍,并有可能颠覆我们的交通系统。此外,自动驾驶汽车正在走向合法化,但由于缺乏信任,它们仍然不够安全,无法在现实世界中使用。本调查的目的是描述使用机器学习算法实现自动驾驶汽车的实证研究。在自动驾驶汽车的实现中使用了不同的算法。准确度被用作评估指标。采用了道路车道检测、支持向量机异常检测和视差图算法。从实验分析中,本研究发现,这些机器学习模型自主处理图像的时间更少,道路车道检测的模型准确率达到97%,SVM异常检测的准确率达到98%。所提出的模型比基线模型表现出显著的差异。
{"title":"Implementation of Autonomous Cars using Machine Learning","authors":"Someswari Perla, N. K, Srinidhi Potta","doi":"10.1109/ICECAA55415.2022.9936102","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936102","url":null,"abstract":"In crowded countries like India, traffic problems are a big issue because of the large population. So, autonomous driving is becoming increasingly common and has the potential to disrupt our transportation system. In addition, self-driving cars are on their way to becoming legal, but they are still not safe enough to be used in the real world due to a lack of trust. The purpose of this survey is to describe an em-pirical study on the implementation of autonomous vehicles using machine learning algorithms. Different algorithms are used in the implementation of self-driving cars. Accuracy is used as the evaluation metric. Road Lane Detection, Support Vector Machine(SVM) for anomalies detection, and Disparity Map was used as the algorithms. From the experimental analysis, this research study has observed that these machine learning models have taken less time for processing images autonomously with model accuracies of 97% for road lane detection, and SVM has shown 98% of accuracy for anomaly detection. The proposed models have outperformed baseline models with a significant difference.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Laboratory Safety Monitoring System for TiO2 Preparation and Catalytic Degradation of Industrial Wastewater based on Multi-Camera Technology 基于多摄像头技术的TiO2制备及工业废水催化降解智能实验室安全监控系统
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936423
Faqiang Liu, Peibei Xia, Ling Tian, Leia Huang, Mengyao Liu, Yongmei Wu
Analyze the characteristics of the laboratory intelligent monitoring system and establish the use of AVR Atmegal28 as the main controller; carry out research on the sensor technology, and analyze the characteristics of the sensor and laboratory intelligent monitoring system. Through a simple method is the use of titanium dioxide nanowires, reduction oxidation A novel porphyrin-sensitized TiO2/rGO photocatalyst was synthesized from graphene and porphyrin. Determine the temperature, humidity, alcohol, carbon dioxide and other sensors used in the laboratory intelligent monitoring system; take the AVR Atmegal28 as the core, expand the peripheral circuits, and connect the temperature, humidity, alcohol, carbon dioxide and other sensor modules to design the laboratory intelligent monitoring system.
分析了实验室智能监控系统的特点,建立了以AVR Atmegal28为主要控制器的实验室智能监控系统;对传感器技术进行了研究,分析了传感器与实验室智能监控系统的特点。以石墨烯和卟啉为原料,合成了一种新型的卟啉敏化TiO2/rGO光催化剂。测定温度、湿度、酒精、二氧化碳等传感器用于实验室智能监控系统;以AVR Atmegal28为核心,扩展外围电路,连接温度、湿度、酒精、二氧化碳等传感器模块,设计实验室智能监控系统。
{"title":"Intelligent Laboratory Safety Monitoring System for TiO2 Preparation and Catalytic Degradation of Industrial Wastewater based on Multi-Camera Technology","authors":"Faqiang Liu, Peibei Xia, Ling Tian, Leia Huang, Mengyao Liu, Yongmei Wu","doi":"10.1109/ICECAA55415.2022.9936423","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936423","url":null,"abstract":"Analyze the characteristics of the laboratory intelligent monitoring system and establish the use of AVR Atmegal28 as the main controller; carry out research on the sensor technology, and analyze the characteristics of the sensor and laboratory intelligent monitoring system. Through a simple method is the use of titanium dioxide nanowires, reduction oxidation A novel porphyrin-sensitized TiO2/rGO photocatalyst was synthesized from graphene and porphyrin. Determine the temperature, humidity, alcohol, carbon dioxide and other sensors used in the laboratory intelligent monitoring system; take the AVR Atmegal28 as the core, expand the peripheral circuits, and connect the temperature, humidity, alcohol, carbon dioxide and other sensor modules to design the laboratory intelligent monitoring system.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"22 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1