首页 > 最新文献

2022 International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Public Sentiment Assessment of Coronavirus-Specific Tweets using a Transformer-based BERT Classifier 基于变压器的BERT分类器对冠状病毒特定推文的公众情绪评估
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936448
Kanak Mahor, A. Manjhvar
Worldwide, the (COVID-19) pandemic had also affected people's daily routines. In general also during lockdown periods, people around the world use social media to express their thoughts and feelings about the epidemic which has interrupted their daily lives. There has been a huge spike in tweets about coronavirus on Twitter in a short period of time, including both positive and negative messages. As a result of the wide range of content in the tweets, the researchers have turned to sentiment analysis in order to gauge how the general public feels about COVID-19. According to the findings of this study, the best way to examine COVID-19 is to look at how people use Twitter to share their thoughts and opinions. Sentiment categorization can be accomplished by utilising a variety of feature sets as well as classifiers in combination with the suggested approach. Tweets collected from people with COVID-19 perceptions can be used to better understand and manage the epidemic. Positive, negative, as well as neutral emotion classifications are being used to classify tweets. In this study, Tweets containing specific information about the Coronavirus epidemic are used as sentiment analysis packages. Bidirectional Encoder Representations from Transformers (BERT) are used to identify sentiment categories, whereas the TF-IDF (term frequency-inverse document frequency) prototype is used to summarise the topics of postings. Trend analysis and qualitative methods are being used to identify negative sentiment traits. In general, when it comes to sentiment classification, the fine-tuned BERT is very accurate. In addition, the COVID-19-related post features of TF-IDF themes are accurately conveyed. Coronavirus tweet sentiments are analysed using a BERT and TF-IDF hybrid classifier. Single-sentence classification is transformed into pair-sentence classification, which solves BERT's performance issue in text classification problems. Our evaluation measures (accuracy= 0.70; precision= 0.67; recall= 0.64; and F1-score= 0.65) are used to evaluate the effectiveness of the classifier.
在世界范围内,新冠肺炎疫情也影响了人们的日常生活。总的来说,在封锁期间,世界各地的人们都在使用社交媒体来表达他们对疫情的想法和感受,这种疫情扰乱了他们的日常生活。在短时间内,推特上关于冠状病毒的推文大幅增加,包括正面和负面的信息。由于推文内容广泛,研究人员转向了情绪分析,以衡量公众对COVID-19的感受。根据这项研究的结果,检查COVID-19的最佳方法是观察人们如何使用推特分享他们的想法和观点。情感分类可以通过利用各种特征集和分类器与建议的方法相结合来完成。从对COVID-19有认识的人那里收集的推文可用于更好地了解和管理这一流行病。积极、消极和中性情绪分类被用来对推文进行分类。在本研究中,包含有关冠状病毒流行的特定信息的推文被用作情绪分析包。来自变形器的双向编码器表示(BERT)用于识别情感类别,而TF-IDF(术语频率-逆文档频率)原型用于总结帖子的主题。趋势分析和定性方法被用于识别负面情绪特征。总的来说,当涉及到情绪分类时,经过微调的BERT是非常准确的。此外,准确传达了TF-IDF主题与新冠肺炎相关的帖子特征。使用BERT和TF-IDF混合分类器分析冠状病毒推文情绪。将单句分类转化为对句分类,解决了BERT在文本分类问题中的性能问题。我们的评估方法(准确度= 0.70;精度= 0.67;回忆= 0.64;和F1-score= 0.65)来评价分类器的有效性。
{"title":"Public Sentiment Assessment of Coronavirus-Specific Tweets using a Transformer-based BERT Classifier","authors":"Kanak Mahor, A. Manjhvar","doi":"10.1109/ICECAA55415.2022.9936448","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936448","url":null,"abstract":"Worldwide, the (COVID-19) pandemic had also affected people's daily routines. In general also during lockdown periods, people around the world use social media to express their thoughts and feelings about the epidemic which has interrupted their daily lives. There has been a huge spike in tweets about coronavirus on Twitter in a short period of time, including both positive and negative messages. As a result of the wide range of content in the tweets, the researchers have turned to sentiment analysis in order to gauge how the general public feels about COVID-19. According to the findings of this study, the best way to examine COVID-19 is to look at how people use Twitter to share their thoughts and opinions. Sentiment categorization can be accomplished by utilising a variety of feature sets as well as classifiers in combination with the suggested approach. Tweets collected from people with COVID-19 perceptions can be used to better understand and manage the epidemic. Positive, negative, as well as neutral emotion classifications are being used to classify tweets. In this study, Tweets containing specific information about the Coronavirus epidemic are used as sentiment analysis packages. Bidirectional Encoder Representations from Transformers (BERT) are used to identify sentiment categories, whereas the TF-IDF (term frequency-inverse document frequency) prototype is used to summarise the topics of postings. Trend analysis and qualitative methods are being used to identify negative sentiment traits. In general, when it comes to sentiment classification, the fine-tuned BERT is very accurate. In addition, the COVID-19-related post features of TF-IDF themes are accurately conveyed. Coronavirus tweet sentiments are analysed using a BERT and TF-IDF hybrid classifier. Single-sentence classification is transformed into pair-sentence classification, which solves BERT's performance issue in text classification problems. Our evaluation measures (accuracy= 0.70; precision= 0.67; recall= 0.64; and F1-score= 0.65) are used to evaluate the effectiveness of the classifier.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128896452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Test of Traditional Art Image Recognition Algorithm Integrated into Children’s Art Works Information Display Platform 传统艺术图像识别算法集成到儿童艺术作品信息展示平台的稳定性测试
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936224
Yuanyuan Lv
Laser scanning and infrared feature analysis technology are used to collect images of fake art works, and superpixel fusion method is used to fuse the collected information to extract the boundary feature information of images. The article describes in detail how teachers organize and carry out activities in art areas Effective strategies, through the development of colorful art area activities, make art area activities interesting, playable, studious, and develop children's creative thinking ability. The segmentation accuracy rate is stable. Object segmentation technology provides accurate positioning for further contour extraction and removes useless image background.
采用激光扫描和红外特征分析技术采集假艺术品图像,并采用超像素融合方法对采集到的信息进行融合,提取图像的边界特征信息。文章详细阐述了教师如何组织和开展艺术区活动的有效策略,通过开展丰富多彩的艺术区活动,使艺术区活动有趣、可玩、好学,培养幼儿的创造性思维能力。分割准确率稳定。目标分割技术为进一步的轮廓提取提供准确的定位,去除无用的图像背景。
{"title":"Stability Test of Traditional Art Image Recognition Algorithm Integrated into Children’s Art Works Information Display Platform","authors":"Yuanyuan Lv","doi":"10.1109/ICECAA55415.2022.9936224","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936224","url":null,"abstract":"Laser scanning and infrared feature analysis technology are used to collect images of fake art works, and superpixel fusion method is used to fuse the collected information to extract the boundary feature information of images. The article describes in detail how teachers organize and carry out activities in art areas Effective strategies, through the development of colorful art area activities, make art area activities interesting, playable, studious, and develop children's creative thinking ability. The segmentation accuracy rate is stable. Object segmentation technology provides accurate positioning for further contour extraction and removes useless image background.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of Disease Prediction Model in AWS Cloud 疾病预测模型在AWS云中的部署
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936239
S. Sivakumar, D. Jayaram, S. V, V. Avasthi, R. Dhanalakshmi, S. S. Kumar
More than 500,000 humans go to emergency rooms every year for kidney stone problems. One out of each ten humans will broaden a kidney stone sooner or later in their lives. In India, kidney stones are one of the most common diseases which can be fatal if not treated properly. It can be caused by various parameters making it even more difficult to treat. When kidney stones are discovered in their early stages, they are much easier to treat than when they are discovered later on. To help this purpose, this study aims the development a website that is capable of predicting the presence of kidney stones using an image that was uploaded by the user itself. This website serves as a preliminary screening tool for the detection of kidney stones. This website is backed up by the algorithm which is proven to be the best in the prediction of kidney stones after a comparison between two different algorithms. These algorithms are trained and tested using the dataset which was obtained from Kaggle. This dataset is preprocessed to ensure the best performance of the classifier models. The performance of both the models is then compared and it is found that theSupport Vector Machine (SVM) algorithm is better than the Logistic Regression (LR) algorithm. The website is also integrated with the cloud using the AWS platform. This ensures the presence of an eternal space that supports the website when the number of users of the website increases.
每年有超过50万人因为肾结石问题去急诊室。每十个人中就有一个人迟早会在他们的生活中扩大肾结石。在印度,肾结石是最常见的疾病之一,如果治疗不当,可能会致命。它可以由各种参数引起,使其更难治疗。当肾结石在早期阶段被发现时,治疗起来要比在后期被发现容易得多。为了达到这一目的,本研究旨在开发一个能够使用用户自己上传的图像来预测肾结石存在的网站。本网站是初步筛选肾结石的工具。通过对两种不同算法的比较,证明该算法在预测肾结石方面是最好的。这些算法使用从Kaggle获得的数据集进行训练和测试。该数据集经过预处理,以确保分类器模型的最佳性能。然后比较了两种模型的性能,发现支持向量机(SVM)算法优于逻辑回归(LR)算法。该网站还使用AWS平台与云集成。这确保了一个永恒的空间的存在,当网站的用户数量增加时支持网站。
{"title":"Deployment of Disease Prediction Model in AWS Cloud","authors":"S. Sivakumar, D. Jayaram, S. V, V. Avasthi, R. Dhanalakshmi, S. S. Kumar","doi":"10.1109/ICECAA55415.2022.9936239","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936239","url":null,"abstract":"More than 500,000 humans go to emergency rooms every year for kidney stone problems. One out of each ten humans will broaden a kidney stone sooner or later in their lives. In India, kidney stones are one of the most common diseases which can be fatal if not treated properly. It can be caused by various parameters making it even more difficult to treat. When kidney stones are discovered in their early stages, they are much easier to treat than when they are discovered later on. To help this purpose, this study aims the development a website that is capable of predicting the presence of kidney stones using an image that was uploaded by the user itself. This website serves as a preliminary screening tool for the detection of kidney stones. This website is backed up by the algorithm which is proven to be the best in the prediction of kidney stones after a comparison between two different algorithms. These algorithms are trained and tested using the dataset which was obtained from Kaggle. This dataset is preprocessed to ensure the best performance of the classifier models. The performance of both the models is then compared and it is found that theSupport Vector Machine (SVM) algorithm is better than the Logistic Regression (LR) algorithm. The website is also integrated with the cloud using the AWS platform. This ensures the presence of an eternal space that supports the website when the number of users of the website increases.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Technology to Identify Arboviral Disease-Dengue Prediction 识别虫媒病毒性疾病-登革热预测的深度学习技术
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936511
T. Varshini, Badgu Samatha
Arboviral disease-dengue infections are viral diseases that are transmitted via the bite of infected insects such as mosquitoes. Some of the well-known vector-borne diseases are chikungunya, zika, yellow fever, etc. According to the national centre for vector-borne disease control, the growing number of dengue infections in India has reached 1,23,106 cases in September 2021. This unprecedented increase in the infection has resulted in developing new and automated technologies to detect and recognize the platelets. Aside from the symptoms, this condition can be identified via a blood smear. The proposed technology is based on the images retrieved from blood smears. The image processing and segmentation has been performed by incorporating a deep learning algorithm to detect and determine whether the image is dengue infected or not infected by counting the platelets in the blood cells.
虫媒病毒性疾病——登革热感染是通过蚊子等受感染昆虫的叮咬传播的病毒性疾病。一些众所周知的媒介传播疾病是基孔肯雅热、寨卡病毒、黄热病等。根据国家媒介传播疾病控制中心的数据,2021年9月,印度登革热感染人数不断增加,已达到1,23,106例。这种前所未有的感染增加导致开发新的自动化技术来检测和识别血小板。除了症状,这种情况可以通过血液涂片来确定。该技术基于从血液涂片中提取的图像。图像处理和分割是通过结合深度学习算法进行的,通过计数血细胞中的血小板来检测和确定图像是否感染登革热。
{"title":"Deep Learning Technology to Identify Arboviral Disease-Dengue Prediction","authors":"T. Varshini, Badgu Samatha","doi":"10.1109/ICECAA55415.2022.9936511","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936511","url":null,"abstract":"Arboviral disease-dengue infections are viral diseases that are transmitted via the bite of infected insects such as mosquitoes. Some of the well-known vector-borne diseases are chikungunya, zika, yellow fever, etc. According to the national centre for vector-borne disease control, the growing number of dengue infections in India has reached 1,23,106 cases in September 2021. This unprecedented increase in the infection has resulted in developing new and automated technologies to detect and recognize the platelets. Aside from the symptoms, this condition can be identified via a blood smear. The proposed technology is based on the images retrieved from blood smears. The image processing and segmentation has been performed by incorporating a deep learning algorithm to detect and determine whether the image is dengue infected or not infected by counting the platelets in the blood cells.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architectural and Functional Differences in Dot Net Solutions 网点解决方案的架构和功能差异
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936278
Arpit Arora, Mohana Mohana
In the product development and management area, .NET is critical. The sequential development of versions of .NET describes the importance and continuous feedback of customers about their experience. There are several architectural and functional differences of .NET evolution to its cross-platform version i.e., .NET core and above. Prominence of .NET in the improvement of development sector is evident. Quantum of open-source projects all over the globe and place of C# among the five most well-known programming languages are two pointers. Its ubiquity is simply going to develop, particularly now that the most recent emphasis (.NET 5) has changed business by presenting the idea of general programming advancement. .NET help for programming improvement isn’t restricted to the numerous programming dialects can utilize. .NET likewise advances utilization of a few prescribed procedures while allowing to utilize the methodology like to construct our application. .NET framework was the underlying kind of .NET. It gives engineer a bunch of APIs for most widely recognized programming needs and connects with basic working framework. It runs just on Windows, and its lifecycle is reaching a conclusion at this moment, after the arrival of .NET 5. Numerous executions emerged from that point forward, so the .NET name made ambiguities. .NET 5 means to make concrete the underlying vision of a widespread improvement stage.
在产品开发和管理领域,. net至关重要。. net版本的连续开发描述了客户对其体验的重要性和持续反馈。从。net演进到跨平台版本,即。net核心及以上版本,在架构和功能上存在一些差异。. net在改进开发领域中的突出作用是显而易见的。全球开源项目的数量和c#在五大最知名编程语言中的地位是两个指针。它的无处不在只会继续发展,特别是现在,最近的重点是。.NET通过提出通用编程改进的概念改变了业务。.NET对编程改进的帮助不仅限于可以使用的众多编程方言。.NET还促进了一些指定过程的使用,同时允许使用类似于构建应用程序的方法。NET框架是。NET的基础。它为工程师提供了一堆api,以满足最广泛认可的编程需求,并与基本的工作框架相连接。它只在Windows上运行,在。net 5到来之后,它的生命周期在这一刻即将结束。从那以后出现了大量的执行,所以。net的名字变得模棱两可,. net 5意味着使广泛改进阶段的潜在愿景具体化。
{"title":"Architectural and Functional Differences in Dot Net Solutions","authors":"Arpit Arora, Mohana Mohana","doi":"10.1109/ICECAA55415.2022.9936278","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936278","url":null,"abstract":"In the product development and management area, .NET is critical. The sequential development of versions of .NET describes the importance and continuous feedback of customers about their experience. There are several architectural and functional differences of .NET evolution to its cross-platform version i.e., .NET core and above. Prominence of .NET in the improvement of development sector is evident. Quantum of open-source projects all over the globe and place of C# among the five most well-known programming languages are two pointers. Its ubiquity is simply going to develop, particularly now that the most recent emphasis (.NET 5) has changed business by presenting the idea of general programming advancement. .NET help for programming improvement isn’t restricted to the numerous programming dialects can utilize. .NET likewise advances utilization of a few prescribed procedures while allowing to utilize the methodology like to construct our application. .NET framework was the underlying kind of .NET. It gives engineer a bunch of APIs for most widely recognized programming needs and connects with basic working framework. It runs just on Windows, and its lifecycle is reaching a conclusion at this moment, after the arrival of .NET 5. Numerous executions emerged from that point forward, so the .NET name made ambiguities. .NET 5 means to make concrete the underlying vision of a widespread improvement stage.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Algorithm for Detecting Spasmodic Dysphonia Voice Pathology using Random Forest Frame Work 一种基于随机森林框架的痉挛性发声障碍语音病理检测新算法
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936567
G. Murthy, V. Iswarya, K. R. Sri, K. Harshitha, Ch. Prasanth
Spasmodic dysphonia, a rare voice disorder is detected in the current work using Random Forest frame work. Voice pathology is related to the vocal tract area affecting the quality of speech. Numerous voice pathologies have been over the years of them are unnoticed as the symptoms are not significant. Even the symptoms are known the nature of the disorder is difficult to identify due to the over lapping nature of the symptoms. The existing algorithms for voice pathology detection are capable of classifying between normal and affected subjects, while the nature of the disorder has been considered in the proposed algorithm. Computational complexity has been reduced due to the incorporation of finite significant energy features estimated over non overlapping frames. Classification of accuracy of 93.5 has been seen with a population of 100 trees.
痉挛性语音障碍是一种罕见的语音障碍,在目前的工作中使用随机森林框架来检测。语音病理与影响语音质量的声道区域有关。多年来,许多声音病理都被忽视了,因为症状并不明显。即使症状是已知的,但由于症状的重叠性,这种疾病的性质很难确定。现有的语音病理检测算法能够对正常受试者和受影响受试者进行分类,而本文提出的算法考虑了疾病的性质。由于结合了在非重叠帧上估计的有限重要能量特征,因此降低了计算复杂度。100棵树的分类精度为93.5。
{"title":"A Novel Algorithm for Detecting Spasmodic Dysphonia Voice Pathology using Random Forest Frame Work","authors":"G. Murthy, V. Iswarya, K. R. Sri, K. Harshitha, Ch. Prasanth","doi":"10.1109/ICECAA55415.2022.9936567","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936567","url":null,"abstract":"Spasmodic dysphonia, a rare voice disorder is detected in the current work using Random Forest frame work. Voice pathology is related to the vocal tract area affecting the quality of speech. Numerous voice pathologies have been over the years of them are unnoticed as the symptoms are not significant. Even the symptoms are known the nature of the disorder is difficult to identify due to the over lapping nature of the symptoms. The existing algorithms for voice pathology detection are capable of classifying between normal and affected subjects, while the nature of the disorder has been considered in the proposed algorithm. Computational complexity has been reduced due to the incorporation of finite significant energy features estimated over non overlapping frames. Classification of accuracy of 93.5 has been seen with a population of 100 trees.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reliable, Secure and Efficient Decentralised Conditional of KYC Verification System: A Blockchain Approach 可靠、安全、高效的去中心化KYC验证系统:一种区块链方法
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936486
Bhavya Dhiman, Rubin Bose S
KYC or Know Your Customer is the procedure to verify the individuality of its consumers & evaluating the possible dangers of illegitimate trade relations. A few problems with the existing KYC manual process are that it is less secure, time-consuming and expensive. With the advent of Blockchain technology, its structures such as consistency, security, and geographical diversity make them an ideal solution to such problems. Although marketing solutions such as KYC-chain.co, K-Y-C. The legal right to enable blockchain-based KYC authentication provides a way for documents to be verified by a trusted network participant. This project uses an ETHereum based Optimised KYC Block-chain system with uniform A-E-S encryption and compression built on the LZ method. The system publicly verifies a distributed encryption, is protected by cryptography, operates by pressing the algorithm and is all well-designed blockchain features. The suggested scheme is a novel explanation based on Distributed Ledger Technology or Blockchain technology that would cut KYC authentication process expenses of organisations & decrease the regular schedule for completion of the procedure whilst becoming easier for clients. The largest difference in the system in traditional methods is the full authentication procedure is performed in just no time for every client, regardless of the number of institutions you desire to be linked to. Furthermore, since DLT is employed, validation findings may be securely distributed to consumers, enhancing transparency. Based on this method, a Proof of Concept (POC) is produced with Ethereum's API, websites as endpoints and the android app as the front office, recognising the viability and efficacy of this technique. Ultimately, this strategy enhances consumer satisfaction, lowers budget overrun & promotes transparency in the customer transport network.
KYC或了解你的客户是验证其消费者的个性和评估非法贸易关系可能存在的危险的程序。现有KYC手动流程的一些问题是,它不太安全,耗时且昂贵。随着区块链技术的出现,其一致性、安全性和地域多样性等结构使其成为解决此类问题的理想方案。虽然营销解决方案如kyc链。有限公司K-Y-C。启用基于区块链的KYC身份验证的合法权利为可信网络参与者验证文档提供了一种方法。本项目使用基于以太坊的优化KYC区块链系统,在LZ方法上构建统一的A-E-S加密和压缩。该系统公开验证分布式加密,受密码学保护,通过按算法运行,并且具有精心设计的区块链功能。建议的方案是一种基于分布式账本技术或区块链技术的新颖解释,它将削减组织的KYC认证过程费用,并减少完成该过程的常规时间表,同时对客户来说变得更容易。该系统与传统方法的最大区别在于,无论您希望链接到多少家机构,都可以在短时间内为每个客户端执行完整的身份验证过程。此外,由于采用了DLT,验证结果可以安全地分发给消费者,从而提高了透明度。基于这种方法,以以太坊的API,网站作为端点,android应用程序作为前台生成概念验证(POC),以识别该技术的可行性和有效性。最终,这一策略提高了消费者满意度,降低了预算超支,提高了客户运输网络的透明度。
{"title":"A Reliable, Secure and Efficient Decentralised Conditional of KYC Verification System: A Blockchain Approach","authors":"Bhavya Dhiman, Rubin Bose S","doi":"10.1109/ICECAA55415.2022.9936486","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936486","url":null,"abstract":"KYC or Know Your Customer is the procedure to verify the individuality of its consumers & evaluating the possible dangers of illegitimate trade relations. A few problems with the existing KYC manual process are that it is less secure, time-consuming and expensive. With the advent of Blockchain technology, its structures such as consistency, security, and geographical diversity make them an ideal solution to such problems. Although marketing solutions such as KYC-chain.co, K-Y-C. The legal right to enable blockchain-based KYC authentication provides a way for documents to be verified by a trusted network participant. This project uses an ETHereum based Optimised KYC Block-chain system with uniform A-E-S encryption and compression built on the LZ method. The system publicly verifies a distributed encryption, is protected by cryptography, operates by pressing the algorithm and is all well-designed blockchain features. The suggested scheme is a novel explanation based on Distributed Ledger Technology or Blockchain technology that would cut KYC authentication process expenses of organisations & decrease the regular schedule for completion of the procedure whilst becoming easier for clients. The largest difference in the system in traditional methods is the full authentication procedure is performed in just no time for every client, regardless of the number of institutions you desire to be linked to. Furthermore, since DLT is employed, validation findings may be securely distributed to consumers, enhancing transparency. Based on this method, a Proof of Concept (POC) is produced with Ethereum's API, websites as endpoints and the android app as the front office, recognising the viability and efficacy of this technique. Ultimately, this strategy enhances consumer satisfaction, lowers budget overrun & promotes transparency in the customer transport network.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"118 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126417048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Medical Internet of Things with Big Data using RF-BFA and DL in Healthcare System 基于RF-BFA和DL的医疗大数据物联网发展
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936335
Cuddapah Anitha, K. Komala Devi, D. Jayasutha, B. Gomathi, R. Mahaveerakannan, Chamandeep Kaur
Internet of Things (IoT) developments in biomedical and health care technology have opened up exciting new avenues for innovation. A wide range of principles and fascinating examples are explored in this chapter, including theoretical, methodological, conceptual, and empirical aspects of the subject. This research study is initiated with a description on how IoT and big data are being used to analyze a massive image database created daily from diverse sources using big data, machine learning, and other kinds of artificial intelligence to produce structured data for remote diagnosis. Health care providers may rely on the heterogeneous IoT platform to manage their data reliably, thanks to dedicated computing equipment. It is critical to healthcare service reliability that varied data streams are effectively managed owing to variations and errors. To make sense of the gathered data, a Chi-square-based term feature extraction method was employed. Outliers in sensor data are filtered out and unwanted features are removed with the use of density-based spatial clustering (DBSCAN) and random forest (RF)-backward feature elimination (BFE) as RF-BFE. The pre-trained model of Convolutional Neural Network (CNN) is used to make predictions based on these features. Finally, experiments are run to determine the effectiveness of the suggested model based on a number of different criteria.
生物医学和医疗保健技术中的物联网(IoT)发展为创新开辟了令人兴奋的新途径。本章探讨了广泛的原则和迷人的例子,包括理论、方法、概念和经验方面的主题。本研究首先描述了如何使用物联网和大数据来分析每天从不同来源创建的大量图像数据库,使用大数据、机器学习和其他类型的人工智能来生成用于远程诊断的结构化数据。由于有专用的计算设备,医疗保健提供商可以依靠异构物联网平台来可靠地管理其数据。由于变化和错误,有效地管理各种数据流对医疗保健服务的可靠性至关重要。为了使收集到的数据有意义,采用了基于卡方的术语特征提取方法。使用基于密度的空间聚类(DBSCAN)和随机森林(RF)-向后特征消除(BFE)作为RF-BFE来过滤传感器数据中的异常值并去除不需要的特征。使用卷积神经网络(CNN)的预训练模型根据这些特征进行预测。最后,运行实验以确定基于许多不同标准的建议模型的有效性。
{"title":"Development of Medical Internet of Things with Big Data using RF-BFA and DL in Healthcare System","authors":"Cuddapah Anitha, K. Komala Devi, D. Jayasutha, B. Gomathi, R. Mahaveerakannan, Chamandeep Kaur","doi":"10.1109/ICECAA55415.2022.9936335","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936335","url":null,"abstract":"Internet of Things (IoT) developments in biomedical and health care technology have opened up exciting new avenues for innovation. A wide range of principles and fascinating examples are explored in this chapter, including theoretical, methodological, conceptual, and empirical aspects of the subject. This research study is initiated with a description on how IoT and big data are being used to analyze a massive image database created daily from diverse sources using big data, machine learning, and other kinds of artificial intelligence to produce structured data for remote diagnosis. Health care providers may rely on the heterogeneous IoT platform to manage their data reliably, thanks to dedicated computing equipment. It is critical to healthcare service reliability that varied data streams are effectively managed owing to variations and errors. To make sense of the gathered data, a Chi-square-based term feature extraction method was employed. Outliers in sensor data are filtered out and unwanted features are removed with the use of density-based spatial clustering (DBSCAN) and random forest (RF)-backward feature elimination (BFE) as RF-BFE. The pre-trained model of Convolutional Neural Network (CNN) is used to make predictions based on these features. Finally, experiments are run to determine the effectiveness of the suggested model based on a number of different criteria.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Road Safety Approach to Mitigating the Accidents in Vehicular Networks 缓解车辆网络事故的道路安全途径
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936341
Gogineni Hima Bindu, Thalakola Syamsundararao, Vuyyuru Lakshmareddy, P. R., Dasari Koteswara Rao, B. Samatha
The steady increase in the death tolls due to road accidents has gained a significant research attention from both academia and industries. The main reason behind road accidents is vehicle collision. In particular, to model the effect of accidents, the rear-end collisions can be analyzed by using vehicle location and speed. Moreover, the speed, direction, distance between cars, and relative speed of each vehicle simulator in various accident/collision scenarios in automobile networks must be investigated and analyzed. A safety system has been designed to reduce the probability of accidents. The proposed technique estimates the impact of a vehicular collision by considering: pedestrian crossings, interval between collisions, and accident avoidance at intersections. The proposed method is dependent on a novel criterion to determine accidents with 92.6% accuracy. Cases with a 7.4% chance of occurrence allow the passive safety system to help people survive and prevent injury in the case of an emergency.
道路交通事故死亡人数的持续增长引起了学术界和工业界的广泛关注。交通事故的主要原因是车辆碰撞。特别是,为了模拟事故的影响,可以使用车辆位置和速度来分析追尾碰撞。此外,还必须对汽车网络中各种事故/碰撞场景中每个车辆模拟器的速度、方向、车距和相对速度进行调查和分析。为了减少事故发生的可能性,设计了一套安全系统。该技术通过考虑行人过街、碰撞间隔和交叉路口的事故避免来估计车辆碰撞的影响。所提出的方法依赖于一个新的标准来确定事故,准确率为92.6%。发生概率为7.4%的情况下,被动安全系统可以在紧急情况下帮助人们生存并防止受伤。
{"title":"Road Safety Approach to Mitigating the Accidents in Vehicular Networks","authors":"Gogineni Hima Bindu, Thalakola Syamsundararao, Vuyyuru Lakshmareddy, P. R., Dasari Koteswara Rao, B. Samatha","doi":"10.1109/ICECAA55415.2022.9936341","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936341","url":null,"abstract":"The steady increase in the death tolls due to road accidents has gained a significant research attention from both academia and industries. The main reason behind road accidents is vehicle collision. In particular, to model the effect of accidents, the rear-end collisions can be analyzed by using vehicle location and speed. Moreover, the speed, direction, distance between cars, and relative speed of each vehicle simulator in various accident/collision scenarios in automobile networks must be investigated and analyzed. A safety system has been designed to reduce the probability of accidents. The proposed technique estimates the impact of a vehicular collision by considering: pedestrian crossings, interval between collisions, and accident avoidance at intersections. The proposed method is dependent on a novel criterion to determine accidents with 92.6% accuracy. Cases with a 7.4% chance of occurrence allow the passive safety system to help people survive and prevent injury in the case of an emergency.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Stability Big Data Environment of Intelligent Financial Data Abnormal QoS System based on Wolf Pack Algorithm 基于狼群算法的智能金融数据异常QoS系统稳定性大数据环境分析
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936159
Lijuan Cui
A new swarm intelligence algorithm, the Wolf Pack Algorithm has been proposed in this paper, and the convergence of the algorithm is proved based on the Markov chain theory. It reduces the risk of the algorithm falling into local optimum due to the excessively large penalty parameter. Inspired by the reproduction mode of wol ves, a big data environment analysis for the stability of the QoS system for abnormal data is proposed based on the binary wolf pack algorithm. Moreover, the Convolutional Neural Network with 4 hidden layers is used to classify and evaluate the constructed time series financial data. Data testing and analysis are performed using actual financial data. It is believed that the supervision system and relevant laws and regulations need to be improved first; secondly, the big data is used to collect personal credit records so as to establish a sound credit system as soon as possible; finally, through big data and computer technology, risk control methods are innovated to enhance the stability of Internet finance.
本文提出了一种新的群体智能算法——狼群算法,并基于马尔可夫链理论证明了算法的收敛性。它降低了算法因惩罚参数过大而陷入局部最优的风险。受狼的繁殖模式启发,提出了一种基于二元狼群算法的异常数据QoS系统稳定性的大数据环境分析方法。此外,利用具有4个隐藏层的卷积神经网络对构建的时间序列金融数据进行分类和评价。使用实际财务数据进行数据测试和分析。认为首先需要完善监管制度和相关法律法规;其次,利用大数据收集个人信用记录,尽快建立完善的信用体系;最后,通过大数据和计算机技术,创新风控手段,增强互联网金融的稳定性。
{"title":"Analysis of Stability Big Data Environment of Intelligent Financial Data Abnormal QoS System based on Wolf Pack Algorithm","authors":"Lijuan Cui","doi":"10.1109/ICECAA55415.2022.9936159","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936159","url":null,"abstract":"A new swarm intelligence algorithm, the Wolf Pack Algorithm has been proposed in this paper, and the convergence of the algorithm is proved based on the Markov chain theory. It reduces the risk of the algorithm falling into local optimum due to the excessively large penalty parameter. Inspired by the reproduction mode of wol ves, a big data environment analysis for the stability of the QoS system for abnormal data is proposed based on the binary wolf pack algorithm. Moreover, the Convolutional Neural Network with 4 hidden layers is used to classify and evaluate the constructed time series financial data. Data testing and analysis are performed using actual financial data. It is believed that the supervision system and relevant laws and regulations need to be improved first; secondly, the big data is used to collect personal credit records so as to establish a sound credit system as soon as possible; finally, through big data and computer technology, risk control methods are innovated to enhance the stability of Internet finance.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1