首页 > 最新文献

2022 International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Online Platform Innovation of Targeted Training in College Education based on Multi-Dimensional Information Data Mining 基于多维信息数据挖掘的高校定向培训在线平台创新
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936118
Li Xu
This paper proposes a relatively complete multidimensional dynamic data mining system theoretical framework, constructs a multi-dimensional dynamic information representation model, establishes a time series mining model based on support vector regression machine, and a continuous input and output process neural network mining model. The new information teaching system with "multi-dimensional information processing and application in professional research" as the main structure has shown its advantages and characteristics in the current innovative education platform of colleges and universities in my country. This new information teaching system has played a positive supporting role in the development of relevant courses, innovative education platforms and students' innovative ability in colleges and universities.
本文提出了较为完整的多维动态数据挖掘系统理论框架,构建了多维动态信息表示模型,建立了基于支持向量回归机的时间序列挖掘模型,建立了连续输入输出过程神经网络挖掘模型。以“专业研究中的多维信息处理与应用”为主体结构的新型信息教学系统在我国当前高校创新教育平台中显示出其优势和特点。这种新型的信息化教学系统对高校相关课程的开发、创新教育平台的开发和学生创新能力的培养起到了积极的支撑作用。
{"title":"Online Platform Innovation of Targeted Training in College Education based on Multi-Dimensional Information Data Mining","authors":"Li Xu","doi":"10.1109/ICECAA55415.2022.9936118","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936118","url":null,"abstract":"This paper proposes a relatively complete multidimensional dynamic data mining system theoretical framework, constructs a multi-dimensional dynamic information representation model, establishes a time series mining model based on support vector regression machine, and a continuous input and output process neural network mining model. The new information teaching system with \"multi-dimensional information processing and application in professional research\" as the main structure has shown its advantages and characteristics in the current innovative education platform of colleges and universities in my country. This new information teaching system has played a positive supporting role in the development of relevant courses, innovative education platforms and students' innovative ability in colleges and universities.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115047395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Technique to Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Removing Redundant Packets 一种通过去除冗余数据包提高异构无线传感器网络生存期的技术
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936560
Junaid Ahmed Mohammed Abdul, Santhosh Kumar Dhatrika, P. Kumar
A Wireless Sensor Network is an infrastructure-free wireless network that uses an ad-hoc deployment of a large number of wireless sensors to monitor system, physical, and environmental factors. Sensor node energy consumption is a major determinant of wireless sensor network longevity. The Distributed Energy-aware Fuzzy Logic-based routing algorithm (DEFL) proposed in this paper aims to strike a compromise between energy efficiency measures balance. For the shortest path calculation, our architecture captures the network state using relevant energy measurements and maps them to cost values. I also added a Redundant Packet Monitoring Algorithm to each sensor node as a recommended technique, which attaches temporary memory to each sensor node and checks it anytime the sensor node senses any data.
无线传感器网络是一种无需基础设施的无线网络,它使用大量无线传感器的临时部署来监视系统、物理和环境因素。传感器节点能耗是无线传感器网络寿命的主要决定因素。本文提出的基于分布式能量感知模糊逻辑的路由算法(DEFL)旨在在能源效率度量平衡之间达成妥协。对于最短路径计算,我们的架构使用相关的能量测量来捕获网络状态,并将它们映射到成本值。我还向每个传感器节点添加了一个冗余数据包监控算法,作为推荐的技术,它将临时内存附加到每个传感器节点,并在传感器节点感知到任何数据时检查它。
{"title":"A Technique to Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Removing Redundant Packets","authors":"Junaid Ahmed Mohammed Abdul, Santhosh Kumar Dhatrika, P. Kumar","doi":"10.1109/ICECAA55415.2022.9936560","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936560","url":null,"abstract":"A Wireless Sensor Network is an infrastructure-free wireless network that uses an ad-hoc deployment of a large number of wireless sensors to monitor system, physical, and environmental factors. Sensor node energy consumption is a major determinant of wireless sensor network longevity. The Distributed Energy-aware Fuzzy Logic-based routing algorithm (DEFL) proposed in this paper aims to strike a compromise between energy efficiency measures balance. For the shortest path calculation, our architecture captures the network state using relevant energy measurements and maps them to cost values. I also added a Redundant Packet Monitoring Algorithm to each sensor node as a recommended technique, which attaches temporary memory to each sensor node and checks it anytime the sensor node senses any data.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High step-up DC-DC Converter based Renewable Energy System for Improving Power Quality and Low Voltage Stress using PI Controller Technique 基于PI控制技术的高升压DC-DC变换器可再生能源系统改善电能质量和降低电压应力
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936547
Baboo Barik, D. Srinivasan, K. Arulvendhan, Suresh N
A solar cell turns photon energy into electrical potential in a P-N junction (P-Type and N-Type), which are both equivalent circuits. While synchronizing with various grid and non-linear loads, the PV Photovoltaic input source comprises oscillations distorting, voltage sags/swell, and dc voltage of power quality concerns. The proposed technique for resolving the problem is Grid-connected output-based Photovoltaic (P.V.) System Power Quality Improvement. Proportional Integral (PI) Controllers are used in this method to control parameters like sampling rate and Improved Disrupt and Observe values, which have a substantial impact on the inter oscillatory form property of PV systems. The High gain (Step-Up) DC-DC Converter coupled based capacitor is recovered by the passive clamped circuit, which also limits the switch. Maximum power point tracking is a controller technique that provides inter harmonic emission, which is one of the most significant pieces of enhancing source voltage and current. The end result is improved power quality and gain without even any distortion in the Renewable Energy System's output.
太阳能电池在P-N结(p型和n型)中将光子能量转化为电势,两者都是等效电路。在与各种电网和非线性负载同步的同时,光伏光伏输入电源存在振荡畸变、电压跌落/膨胀、直流电压等电能质量问题。为解决这一问题,提出了基于并网输出的光伏发电(pv)技术。系统电能质量改进。该方法使用比例积分(PI)控制器来控制采样率和改进的干扰和观察值等参数,这些参数对光伏系统的互振形式性质有很大影响。基于高增益(升压)DC-DC变换器耦合的电容由无源箝位电路恢复,这也限制了开关。最大功率点跟踪是一种提供谐波间发射的控制技术,是提高电源电压和电流的重要手段之一。最终的结果是改善了电能质量和增益,甚至在可再生能源系统的输出中没有任何失真。
{"title":"High step-up DC-DC Converter based Renewable Energy System for Improving Power Quality and Low Voltage Stress using PI Controller Technique","authors":"Baboo Barik, D. Srinivasan, K. Arulvendhan, Suresh N","doi":"10.1109/ICECAA55415.2022.9936547","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936547","url":null,"abstract":"A solar cell turns photon energy into electrical potential in a P-N junction (P-Type and N-Type), which are both equivalent circuits. While synchronizing with various grid and non-linear loads, the PV Photovoltaic input source comprises oscillations distorting, voltage sags/swell, and dc voltage of power quality concerns. The proposed technique for resolving the problem is Grid-connected output-based Photovoltaic (P.V.) System Power Quality Improvement. Proportional Integral (PI) Controllers are used in this method to control parameters like sampling rate and Improved Disrupt and Observe values, which have a substantial impact on the inter oscillatory form property of PV systems. The High gain (Step-Up) DC-DC Converter coupled based capacitor is recovered by the passive clamped circuit, which also limits the switch. Maximum power point tracking is a controller technique that provides inter harmonic emission, which is one of the most significant pieces of enhancing source voltage and current. The end result is improved power quality and gain without even any distortion in the Renewable Energy System's output.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Densely Search based Fire-Fly (DSFF) Optimization Algorithm for Image Classification Application 一种新的基于密集搜索的萤火虫(DSFF)优化算法在图像分类中的应用
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936409
D. Mahalakshmi, S. Appavu alias Balamurugan, M. Chinnadurai, D. Vaishnavi
Data processing and analytics are wide spread study with profound applications. Data analytics deals with deriving or applying an algorithm to an application that work with dataset. The proposed work analyses the image data with optimization algorithm by using novel method of Fire-Fly (FF) algorithm, which is named as Densely Search Fire-Fly (DSFF) optimization algorithm. The Neural Network (NN) is applied to classify the optimized data. In this process, the optimized data refers to selective attributes from the raw data of image features. To test the performance of proposed optimization, the Gabor feature extraction method is used to fetch the features from raw image data. The Gabor method retrieves the pattern in various angle of projections. This produces 5 × 8 number of patterns to represent the image feature. From this feature attributes of whole image dataset, the optimization search for the best attributes by the reference of weight value is calculated from the particles of Fire-Fly. According to the best selection of attributes from the objective function, the neurons in a network that can segregate the different classes in the training dataset. The performance of the proposed FF algorithm are compared with the traditional optimization methods in the image classification application.
数据处理和分析是一门广泛应用的学科。数据分析处理的是导出或将算法应用于处理数据集的应用程序。本文采用一种新的萤火虫(FF)算法,即密集搜索萤火虫(DSFF)优化算法,对图像数据进行优化分析。应用神经网络对优化后的数据进行分类。在此过程中,优化数据是指从图像特征的原始数据中选择属性。为了测试所提出的优化方法的性能,使用Gabor特征提取方法从原始图像数据中提取特征。Gabor方法在不同角度的投影中检索模式。这将产生5 × 8个图案来表示图像特征。从整个图像数据集的特征属性中,从萤火虫的粒子中计算权重值的参考来优化搜索最佳属性。根据目标函数中属性的最佳选择,网络中的神经元可以隔离训练数据集中的不同类别。在图像分类应用中,将所提出的FF算法与传统的优化方法进行了性能比较。
{"title":"A Novel Densely Search based Fire-Fly (DSFF) Optimization Algorithm for Image Classification Application","authors":"D. Mahalakshmi, S. Appavu alias Balamurugan, M. Chinnadurai, D. Vaishnavi","doi":"10.1109/ICECAA55415.2022.9936409","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936409","url":null,"abstract":"Data processing and analytics are wide spread study with profound applications. Data analytics deals with deriving or applying an algorithm to an application that work with dataset. The proposed work analyses the image data with optimization algorithm by using novel method of Fire-Fly (FF) algorithm, which is named as Densely Search Fire-Fly (DSFF) optimization algorithm. The Neural Network (NN) is applied to classify the optimized data. In this process, the optimized data refers to selective attributes from the raw data of image features. To test the performance of proposed optimization, the Gabor feature extraction method is used to fetch the features from raw image data. The Gabor method retrieves the pattern in various angle of projections. This produces 5 × 8 number of patterns to represent the image feature. From this feature attributes of whole image dataset, the optimization search for the best attributes by the reference of weight value is calculated from the particles of Fire-Fly. According to the best selection of attributes from the objective function, the neurons in a network that can segregate the different classes in the training dataset. The performance of the proposed FF algorithm are compared with the traditional optimization methods in the image classification application.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Breast Abnormality Framework for Detection and Evaluation of Breast Abnormal Parameters 用于乳腺异常参数检测与评估的智能乳腺异常框架
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936206
A. P, Avinash Sharma, S. R. Kawale, S. P. Diwan, Dankan Gowda V
Unlike the healthy cells in the breast tissue, cancerous breast cells are unwelcome and have strange properties. In both sexes, this will quickly expand and infiltrate adjacent tissue, leading to the formation of a tumour. Using the Intelligent-Breast Abnormality Detection (I-BAD) framework, many breast cancer parameters are evaluated in this article. It has already been shown that some indicators may be used for early detection of breast cancer. There is also discussion of the instruments and strategies that facilitate the monitoring of the selected breast health metrics. Classification methods that use machine learning to store and analyse data are also discussed. The suggested I-BAD framework’s process is then visually shown in clean drawings.
与乳腺组织中的健康细胞不同,乳腺癌细胞不受欢迎,并且具有奇怪的特性。在两性中,这将迅速扩大并浸润邻近组织,导致肿瘤的形成。利用智能乳房异常检测(I-BAD)框架,本文评估了许多乳腺癌参数。已经有研究表明,一些指标可以用于乳腺癌的早期检测。还讨论了促进监测选定的乳房健康指标的手段和战略。还讨论了使用机器学习来存储和分析数据的分类方法。然后,建议的I-BAD框架的过程以清晰的图纸直观地显示出来。
{"title":"Intelligent Breast Abnormality Framework for Detection and Evaluation of Breast Abnormal Parameters","authors":"A. P, Avinash Sharma, S. R. Kawale, S. P. Diwan, Dankan Gowda V","doi":"10.1109/ICECAA55415.2022.9936206","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936206","url":null,"abstract":"Unlike the healthy cells in the breast tissue, cancerous breast cells are unwelcome and have strange properties. In both sexes, this will quickly expand and infiltrate adjacent tissue, leading to the formation of a tumour. Using the Intelligent-Breast Abnormality Detection (I-BAD) framework, many breast cancer parameters are evaluated in this article. It has already been shown that some indicators may be used for early detection of breast cancer. There is also discussion of the instruments and strategies that facilitate the monitoring of the selected breast health metrics. Classification methods that use machine learning to store and analyse data are also discussed. The suggested I-BAD framework’s process is then visually shown in clean drawings.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Improving Security in Edge Computing by using Cognitive Trust Management Model 利用认知信任管理模型提高边缘计算的安全性
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936568
D. Ganesh, K. Suresh, M. S. Kumar, K. Balaji, Sreedhar Burada
As a result of this new computer design, edge computing can process data rapidly and effectively near to the source, avoiding network resource and latency constraints. By shifting computing power to the network edge, edge computing decreases the load on cloud services centers while also reducing the time required for users to input data. Edge computing advantages for data-intensive services, in particular, could be obscured if access latency becomes a bottleneck. Edge computing raises a number of challenges, such as security concerns, data incompleteness, and a hefty up-front and ongoing expense. There is now a shift in the worldwide mobile communications sector toward 5G technology. This unprecedented attention to edge computing has come about because 5G is one of the primary entry technologies for large-scale deployment. Edge computing privacy has been a major concern since the technology’s inception, limiting its adoption and advancement. As the capabilities of edge computing have evolved, so have the security issues that have arisen as a result of these developments, as well as the increasing public demand for privacy protection. The lack of trust amongst IoT devices is exacerbated by the inherent security concerns and assaults that plague IoT edge devices. A cognitive trust management system is proposed to reduce this malicious activity by maintaining the confidence of an appliance & managing the service level belief & Quality of Service (QoS). Improved packet delivery ratio and jitter in cognitive trust management systems based on QoS parameters show promise for spotting potentially harmful edge nodes in computing networks at the edge.
由于这种新的计算机设计,边缘计算可以在靠近源的地方快速有效地处理数据,避免了网络资源和延迟的限制。通过将计算能力转移到网络边缘,边缘计算减少了云服务中心的负载,同时也减少了用户输入数据所需的时间。如果访问延迟成为瓶颈,边缘计算对数据密集型服务的优势可能会被掩盖。边缘计算带来了许多挑战,例如安全问题、数据不完整以及大量的前期和持续费用。现在,全球移动通信领域正在向5G技术转变。这种对边缘计算前所未有的关注之所以出现,是因为5G是大规模部署的主要入口技术之一。自该技术问世以来,边缘计算隐私一直是一个主要问题,限制了它的采用和发展。随着边缘计算功能的发展,这些发展所产生的安全问题以及公众对隐私保护的需求也在不断增加。困扰物联网边缘设备的固有安全问题和攻击加剧了物联网设备之间缺乏信任。提出了一种认知信任管理系统,通过维护设备的信任、管理服务水平信念和服务质量(QoS)来减少这种恶意活动。在基于QoS参数的认知信任管理系统中,改进的数据包传送率和抖动显示了在边缘计算网络中发现潜在有害边缘节点的希望。
{"title":"Improving Security in Edge Computing by using Cognitive Trust Management Model","authors":"D. Ganesh, K. Suresh, M. S. Kumar, K. Balaji, Sreedhar Burada","doi":"10.1109/ICECAA55415.2022.9936568","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936568","url":null,"abstract":"As a result of this new computer design, edge computing can process data rapidly and effectively near to the source, avoiding network resource and latency constraints. By shifting computing power to the network edge, edge computing decreases the load on cloud services centers while also reducing the time required for users to input data. Edge computing advantages for data-intensive services, in particular, could be obscured if access latency becomes a bottleneck. Edge computing raises a number of challenges, such as security concerns, data incompleteness, and a hefty up-front and ongoing expense. There is now a shift in the worldwide mobile communications sector toward 5G technology. This unprecedented attention to edge computing has come about because 5G is one of the primary entry technologies for large-scale deployment. Edge computing privacy has been a major concern since the technology’s inception, limiting its adoption and advancement. As the capabilities of edge computing have evolved, so have the security issues that have arisen as a result of these developments, as well as the increasing public demand for privacy protection. The lack of trust amongst IoT devices is exacerbated by the inherent security concerns and assaults that plague IoT edge devices. A cognitive trust management system is proposed to reduce this malicious activity by maintaining the confidence of an appliance & managing the service level belief & Quality of Service (QoS). Improved packet delivery ratio and jitter in cognitive trust management systems based on QoS parameters show promise for spotting potentially harmful edge nodes in computing networks at the edge.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning Technology to Identify Arboviral Disease-Dengue Prediction 识别虫媒病毒性疾病-登革热预测的深度学习技术
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936511
T. Varshini, Badgu Samatha
Arboviral disease-dengue infections are viral diseases that are transmitted via the bite of infected insects such as mosquitoes. Some of the well-known vector-borne diseases are chikungunya, zika, yellow fever, etc. According to the national centre for vector-borne disease control, the growing number of dengue infections in India has reached 1,23,106 cases in September 2021. This unprecedented increase in the infection has resulted in developing new and automated technologies to detect and recognize the platelets. Aside from the symptoms, this condition can be identified via a blood smear. The proposed technology is based on the images retrieved from blood smears. The image processing and segmentation has been performed by incorporating a deep learning algorithm to detect and determine whether the image is dengue infected or not infected by counting the platelets in the blood cells.
虫媒病毒性疾病——登革热感染是通过蚊子等受感染昆虫的叮咬传播的病毒性疾病。一些众所周知的媒介传播疾病是基孔肯雅热、寨卡病毒、黄热病等。根据国家媒介传播疾病控制中心的数据,2021年9月,印度登革热感染人数不断增加,已达到1,23,106例。这种前所未有的感染增加导致开发新的自动化技术来检测和识别血小板。除了症状,这种情况可以通过血液涂片来确定。该技术基于从血液涂片中提取的图像。图像处理和分割是通过结合深度学习算法进行的,通过计数血细胞中的血小板来检测和确定图像是否感染登革热。
{"title":"Deep Learning Technology to Identify Arboviral Disease-Dengue Prediction","authors":"T. Varshini, Badgu Samatha","doi":"10.1109/ICECAA55415.2022.9936511","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936511","url":null,"abstract":"Arboviral disease-dengue infections are viral diseases that are transmitted via the bite of infected insects such as mosquitoes. Some of the well-known vector-borne diseases are chikungunya, zika, yellow fever, etc. According to the national centre for vector-borne disease control, the growing number of dengue infections in India has reached 1,23,106 cases in September 2021. This unprecedented increase in the infection has resulted in developing new and automated technologies to detect and recognize the platelets. Aside from the symptoms, this condition can be identified via a blood smear. The proposed technology is based on the images retrieved from blood smears. The image processing and segmentation has been performed by incorporating a deep learning algorithm to detect and determine whether the image is dengue infected or not infected by counting the platelets in the blood cells.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Road Safety Approach to Mitigating the Accidents in Vehicular Networks 缓解车辆网络事故的道路安全途径
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936341
Gogineni Hima Bindu, Thalakola Syamsundararao, Vuyyuru Lakshmareddy, P. R., Dasari Koteswara Rao, B. Samatha
The steady increase in the death tolls due to road accidents has gained a significant research attention from both academia and industries. The main reason behind road accidents is vehicle collision. In particular, to model the effect of accidents, the rear-end collisions can be analyzed by using vehicle location and speed. Moreover, the speed, direction, distance between cars, and relative speed of each vehicle simulator in various accident/collision scenarios in automobile networks must be investigated and analyzed. A safety system has been designed to reduce the probability of accidents. The proposed technique estimates the impact of a vehicular collision by considering: pedestrian crossings, interval between collisions, and accident avoidance at intersections. The proposed method is dependent on a novel criterion to determine accidents with 92.6% accuracy. Cases with a 7.4% chance of occurrence allow the passive safety system to help people survive and prevent injury in the case of an emergency.
道路交通事故死亡人数的持续增长引起了学术界和工业界的广泛关注。交通事故的主要原因是车辆碰撞。特别是,为了模拟事故的影响,可以使用车辆位置和速度来分析追尾碰撞。此外,还必须对汽车网络中各种事故/碰撞场景中每个车辆模拟器的速度、方向、车距和相对速度进行调查和分析。为了减少事故发生的可能性,设计了一套安全系统。该技术通过考虑行人过街、碰撞间隔和交叉路口的事故避免来估计车辆碰撞的影响。所提出的方法依赖于一个新的标准来确定事故,准确率为92.6%。发生概率为7.4%的情况下,被动安全系统可以在紧急情况下帮助人们生存并防止受伤。
{"title":"Road Safety Approach to Mitigating the Accidents in Vehicular Networks","authors":"Gogineni Hima Bindu, Thalakola Syamsundararao, Vuyyuru Lakshmareddy, P. R., Dasari Koteswara Rao, B. Samatha","doi":"10.1109/ICECAA55415.2022.9936341","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936341","url":null,"abstract":"The steady increase in the death tolls due to road accidents has gained a significant research attention from both academia and industries. The main reason behind road accidents is vehicle collision. In particular, to model the effect of accidents, the rear-end collisions can be analyzed by using vehicle location and speed. Moreover, the speed, direction, distance between cars, and relative speed of each vehicle simulator in various accident/collision scenarios in automobile networks must be investigated and analyzed. A safety system has been designed to reduce the probability of accidents. The proposed technique estimates the impact of a vehicular collision by considering: pedestrian crossings, interval between collisions, and accident avoidance at intersections. The proposed method is dependent on a novel criterion to determine accidents with 92.6% accuracy. Cases with a 7.4% chance of occurrence allow the passive safety system to help people survive and prevent injury in the case of an emergency.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Sentiment Assessment of Coronavirus-Specific Tweets using a Transformer-based BERT Classifier 基于变压器的BERT分类器对冠状病毒特定推文的公众情绪评估
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936448
Kanak Mahor, A. Manjhvar
Worldwide, the (COVID-19) pandemic had also affected people's daily routines. In general also during lockdown periods, people around the world use social media to express their thoughts and feelings about the epidemic which has interrupted their daily lives. There has been a huge spike in tweets about coronavirus on Twitter in a short period of time, including both positive and negative messages. As a result of the wide range of content in the tweets, the researchers have turned to sentiment analysis in order to gauge how the general public feels about COVID-19. According to the findings of this study, the best way to examine COVID-19 is to look at how people use Twitter to share their thoughts and opinions. Sentiment categorization can be accomplished by utilising a variety of feature sets as well as classifiers in combination with the suggested approach. Tweets collected from people with COVID-19 perceptions can be used to better understand and manage the epidemic. Positive, negative, as well as neutral emotion classifications are being used to classify tweets. In this study, Tweets containing specific information about the Coronavirus epidemic are used as sentiment analysis packages. Bidirectional Encoder Representations from Transformers (BERT) are used to identify sentiment categories, whereas the TF-IDF (term frequency-inverse document frequency) prototype is used to summarise the topics of postings. Trend analysis and qualitative methods are being used to identify negative sentiment traits. In general, when it comes to sentiment classification, the fine-tuned BERT is very accurate. In addition, the COVID-19-related post features of TF-IDF themes are accurately conveyed. Coronavirus tweet sentiments are analysed using a BERT and TF-IDF hybrid classifier. Single-sentence classification is transformed into pair-sentence classification, which solves BERT's performance issue in text classification problems. Our evaluation measures (accuracy= 0.70; precision= 0.67; recall= 0.64; and F1-score= 0.65) are used to evaluate the effectiveness of the classifier.
在世界范围内,新冠肺炎疫情也影响了人们的日常生活。总的来说,在封锁期间,世界各地的人们都在使用社交媒体来表达他们对疫情的想法和感受,这种疫情扰乱了他们的日常生活。在短时间内,推特上关于冠状病毒的推文大幅增加,包括正面和负面的信息。由于推文内容广泛,研究人员转向了情绪分析,以衡量公众对COVID-19的感受。根据这项研究的结果,检查COVID-19的最佳方法是观察人们如何使用推特分享他们的想法和观点。情感分类可以通过利用各种特征集和分类器与建议的方法相结合来完成。从对COVID-19有认识的人那里收集的推文可用于更好地了解和管理这一流行病。积极、消极和中性情绪分类被用来对推文进行分类。在本研究中,包含有关冠状病毒流行的特定信息的推文被用作情绪分析包。来自变形器的双向编码器表示(BERT)用于识别情感类别,而TF-IDF(术语频率-逆文档频率)原型用于总结帖子的主题。趋势分析和定性方法被用于识别负面情绪特征。总的来说,当涉及到情绪分类时,经过微调的BERT是非常准确的。此外,准确传达了TF-IDF主题与新冠肺炎相关的帖子特征。使用BERT和TF-IDF混合分类器分析冠状病毒推文情绪。将单句分类转化为对句分类,解决了BERT在文本分类问题中的性能问题。我们的评估方法(准确度= 0.70;精度= 0.67;回忆= 0.64;和F1-score= 0.65)来评价分类器的有效性。
{"title":"Public Sentiment Assessment of Coronavirus-Specific Tweets using a Transformer-based BERT Classifier","authors":"Kanak Mahor, A. Manjhvar","doi":"10.1109/ICECAA55415.2022.9936448","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936448","url":null,"abstract":"Worldwide, the (COVID-19) pandemic had also affected people's daily routines. In general also during lockdown periods, people around the world use social media to express their thoughts and feelings about the epidemic which has interrupted their daily lives. There has been a huge spike in tweets about coronavirus on Twitter in a short period of time, including both positive and negative messages. As a result of the wide range of content in the tweets, the researchers have turned to sentiment analysis in order to gauge how the general public feels about COVID-19. According to the findings of this study, the best way to examine COVID-19 is to look at how people use Twitter to share their thoughts and opinions. Sentiment categorization can be accomplished by utilising a variety of feature sets as well as classifiers in combination with the suggested approach. Tweets collected from people with COVID-19 perceptions can be used to better understand and manage the epidemic. Positive, negative, as well as neutral emotion classifications are being used to classify tweets. In this study, Tweets containing specific information about the Coronavirus epidemic are used as sentiment analysis packages. Bidirectional Encoder Representations from Transformers (BERT) are used to identify sentiment categories, whereas the TF-IDF (term frequency-inverse document frequency) prototype is used to summarise the topics of postings. Trend analysis and qualitative methods are being used to identify negative sentiment traits. In general, when it comes to sentiment classification, the fine-tuned BERT is very accurate. In addition, the COVID-19-related post features of TF-IDF themes are accurately conveyed. Coronavirus tweet sentiments are analysed using a BERT and TF-IDF hybrid classifier. Single-sentence classification is transformed into pair-sentence classification, which solves BERT's performance issue in text classification problems. Our evaluation measures (accuracy= 0.70; precision= 0.67; recall= 0.64; and F1-score= 0.65) are used to evaluate the effectiveness of the classifier.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128896452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Stability Big Data Environment of Intelligent Financial Data Abnormal QoS System based on Wolf Pack Algorithm 基于狼群算法的智能金融数据异常QoS系统稳定性大数据环境分析
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936159
Lijuan Cui
A new swarm intelligence algorithm, the Wolf Pack Algorithm has been proposed in this paper, and the convergence of the algorithm is proved based on the Markov chain theory. It reduces the risk of the algorithm falling into local optimum due to the excessively large penalty parameter. Inspired by the reproduction mode of wol ves, a big data environment analysis for the stability of the QoS system for abnormal data is proposed based on the binary wolf pack algorithm. Moreover, the Convolutional Neural Network with 4 hidden layers is used to classify and evaluate the constructed time series financial data. Data testing and analysis are performed using actual financial data. It is believed that the supervision system and relevant laws and regulations need to be improved first; secondly, the big data is used to collect personal credit records so as to establish a sound credit system as soon as possible; finally, through big data and computer technology, risk control methods are innovated to enhance the stability of Internet finance.
本文提出了一种新的群体智能算法——狼群算法,并基于马尔可夫链理论证明了算法的收敛性。它降低了算法因惩罚参数过大而陷入局部最优的风险。受狼的繁殖模式启发,提出了一种基于二元狼群算法的异常数据QoS系统稳定性的大数据环境分析方法。此外,利用具有4个隐藏层的卷积神经网络对构建的时间序列金融数据进行分类和评价。使用实际财务数据进行数据测试和分析。认为首先需要完善监管制度和相关法律法规;其次,利用大数据收集个人信用记录,尽快建立完善的信用体系;最后,通过大数据和计算机技术,创新风控手段,增强互联网金融的稳定性。
{"title":"Analysis of Stability Big Data Environment of Intelligent Financial Data Abnormal QoS System based on Wolf Pack Algorithm","authors":"Lijuan Cui","doi":"10.1109/ICECAA55415.2022.9936159","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936159","url":null,"abstract":"A new swarm intelligence algorithm, the Wolf Pack Algorithm has been proposed in this paper, and the convergence of the algorithm is proved based on the Markov chain theory. It reduces the risk of the algorithm falling into local optimum due to the excessively large penalty parameter. Inspired by the reproduction mode of wol ves, a big data environment analysis for the stability of the QoS system for abnormal data is proposed based on the binary wolf pack algorithm. Moreover, the Convolutional Neural Network with 4 hidden layers is used to classify and evaluate the constructed time series financial data. Data testing and analysis are performed using actual financial data. It is believed that the supervision system and relevant laws and regulations need to be improved first; secondly, the big data is used to collect personal credit records so as to establish a sound credit system as soon as possible; finally, through big data and computer technology, risk control methods are innovated to enhance the stability of Internet finance.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1