首页 > 最新文献

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
Definitions, Difficulties and Current Research Directions for the Internet of Things 物联网的定义、难点及当前研究方向
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072500
V. Veeraiah, G. K. Ravikaumar, D. Bhuva, Rajesh Singh, Adusupalle Muni Raju, Unnati Joshi
A brand-new paradigm known as the Internet of Things (IoT) offers a variety of innovative services for the upcoming wave of technological breakthroughs. There are several IoT applications that enable seamless connections between the real and digital worlds. Notwithstanding the huge endeavors of normalization bodies, alliances, organizations, scientists, and others, there are as yet various issues to be settled before the capability of IoT can be totally understood. While breaking down these concerns, various perspectives, for example, empowering innovation, applications, plans of action, cultural implications, and natural effects, ought to be thought about. This exposition centers on recent concerns and difficulties as seen according to an innovative viewpoint. To empower a superior comprehension of the IoT’s parts, we have highlighted many views that support this paradigm.Additionally, this thorough analysis offers insights into the most recent developments in emerging and IoT supporting technologies. Details are provided for the ones that are the most important. The primary goal is to provide a thorough review of the problems and obstacles that need to be overcome by future research. In order to aid future study, we offer some insights into certain specific emerging theories. Additionally, this publication organises the body of literature by categorising contributions into various research areas.
被称为物联网(IoT)的全新范式为即将到来的技术突破浪潮提供了各种创新服务。有几种物联网应用可以实现现实世界和数字世界之间的无缝连接。尽管标准化机构、联盟、组织、科学家和其他人做出了巨大的努力,但在完全理解物联网的能力之前,仍有许多问题需要解决。在分解这些问题的同时,应该考虑不同的观点,例如,授权创新、应用、行动计划、文化影响和自然影响。本文以一种创新的观点,围绕当前的问题和困难展开论述。为了更好地理解物联网的各个部分,我们强调了许多支持这种范式的观点。此外,这项全面的分析还提供了对新兴技术和物联网支持技术最新发展的见解。提供了最重要的细节。主要目标是对未来研究需要克服的问题和障碍进行全面审查。为了帮助未来的研究,我们对某些特定的新兴理论提出了一些见解。此外,本出版物通过将贡献分类到不同的研究领域来组织文献。
{"title":"Definitions, Difficulties and Current Research Directions for the Internet of Things","authors":"V. Veeraiah, G. K. Ravikaumar, D. Bhuva, Rajesh Singh, Adusupalle Muni Raju, Unnati Joshi","doi":"10.1109/IC3I56241.2022.10072500","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072500","url":null,"abstract":"A brand-new paradigm known as the Internet of Things (IoT) offers a variety of innovative services for the upcoming wave of technological breakthroughs. There are several IoT applications that enable seamless connections between the real and digital worlds. Notwithstanding the huge endeavors of normalization bodies, alliances, organizations, scientists, and others, there are as yet various issues to be settled before the capability of IoT can be totally understood. While breaking down these concerns, various perspectives, for example, empowering innovation, applications, plans of action, cultural implications, and natural effects, ought to be thought about. This exposition centers on recent concerns and difficulties as seen according to an innovative viewpoint. To empower a superior comprehension of the IoT’s parts, we have highlighted many views that support this paradigm.Additionally, this thorough analysis offers insights into the most recent developments in emerging and IoT supporting technologies. Details are provided for the ones that are the most important. The primary goal is to provide a thorough review of the problems and obstacles that need to be overcome by future research. In order to aid future study, we offer some insights into certain specific emerging theories. Additionally, this publication organises the body of literature by categorising contributions into various research areas.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting COVID using CNN from Chest X-Beams 利用CNN胸部x射线检测COVID
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073457
Manpreet Singh, Prerna Agarwal, P. Shrivastava, Harpreet Kaur
Since inception of Corona Virus, 47.6 Cr. individuals got infected and 61L deaths occurred. Still it’s going on and spreading across the world. Many health workers, researchers, experts, scientists are making efforts to slow down its pace & putting efforts in evaluating the techniques to detect it. For this, it is highly required to understand the virus & its versions. It is a part of SARS – Severe acute respiratory syndrome. To detect COVID, there are numerous ways but using Chest X-beams we are able to reduce the detection time and cost. To evaluate the Chest X-beams we need radiologists. So here, we develop a model to identify COVID X-beam in comparison to Normal X-beam. These days DL algo’s are producing best results in classification. A pre-trained CNN models using large datasets is to preferred for image classification. Firstly our models need to be trained and then tested to recognize the images of X-beams of one of the either case. Logically we have to locate the best CNN model for diagnosis.
自冠状病毒出现以来,共有47.6亿人感染,611人死亡。但它仍在继续,并在世界各地蔓延。许多卫生工作者、研究人员、专家和科学家正在努力减缓其速度,并努力评估检测它的技术。为此,非常需要了解病毒及其版本。它是SARS(严重急性呼吸系统综合症)的一部分。检测COVID有多种方法,但使用胸部x射线,我们能够减少检测时间和成本。要评估胸部x光我们需要放射科医生。因此,在这里,我们开发了一个模型来识别COVID x射线和普通x射线。如今,深度学习算法在分类方面产生了最好的结果。使用大数据集进行预训练的CNN模型更适合用于图像分类。首先,我们的模型需要进行训练,然后进行测试,以识别任意一种情况下的x射线图像。从逻辑上讲,我们必须找到最好的CNN模型进行诊断。
{"title":"Detecting COVID using CNN from Chest X-Beams","authors":"Manpreet Singh, Prerna Agarwal, P. Shrivastava, Harpreet Kaur","doi":"10.1109/IC3I56241.2022.10073457","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073457","url":null,"abstract":"Since inception of Corona Virus, 47.6 Cr. individuals got infected and 61L deaths occurred. Still it’s going on and spreading across the world. Many health workers, researchers, experts, scientists are making efforts to slow down its pace & putting efforts in evaluating the techniques to detect it. For this, it is highly required to understand the virus & its versions. It is a part of SARS – Severe acute respiratory syndrome. To detect COVID, there are numerous ways but using Chest X-beams we are able to reduce the detection time and cost. To evaluate the Chest X-beams we need radiologists. So here, we develop a model to identify COVID X-beam in comparison to Normal X-beam. These days DL algo’s are producing best results in classification. A pre-trained CNN models using large datasets is to preferred for image classification. Firstly our models need to be trained and then tested to recognize the images of X-beams of one of the either case. Logically we have to locate the best CNN model for diagnosis.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carbohydrate Recommendation for Type-1 Diabetics Patient Using Machine Learning 使用机器学习为1型糖尿病患者推荐碳水化合物
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072919
S. Sreenivasu, Sakshi Gupta, Ghanshyam Vatsa, Anurag Shrivastava, Swati Vashisht, Aparna Srivastava
Diabetes is a chronic illness that develops when the blood glucose level is elevated above normal. Diabetes has a variety of reasons, making diagnosis and treatment more difficult than necessary. A patient’s treatment can benefit greatly from a healthy diet. It is important to keep the diet under control so that it doesn’t include an excessive amount of carbohydrates. This study offers assistance in this case by creating a mobile application and website that can suggest a meal item based on the patient’s needs. For this construction, a dataset with basic data about more than fifty different food items is taken from Kaggle. This dataset is then preprocessed utilizingstandardization and encoding methods. To create two Machine Learning (ML)models, two different ML algorithms were applied. In this study, the K Nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms were used. The models are subsequently trained using the preprocessed dataset. The models are also put to the test to see which one forecasts the patient’s ideal food item the most accurately. The NBalgorithm is the best method that may be used for carbohydrate recommendation, according to the testing of these models. This model’s accuracy is 93.12%.The model is therefore installed in the firebase. Another database that contains the patient’s real-time readings is linked to the firebase software as well. The best meal item with the right amount of carbohydrates is then given by the doctor through the website. A food proposal is provided to the patient’s mobile phone together with information like the values of the vital metrics. Based on the patient’s vital signs and required carbohydrate intake, the ML system particularly selects this meal item.
糖尿病是一种慢性疾病,当血糖水平高于正常水平时就会发展。糖尿病有各种各样的原因,使得诊断和治疗比必要时更加困难。健康的饮食对病人的治疗大有裨益。控制饮食很重要,这样就不会摄入过多的碳水化合物。在这种情况下,这项研究通过创建一个移动应用程序和网站来提供帮助,该应用程序和网站可以根据患者的需求推荐膳食。对于这个构建,从Kaggle获取了一个包含50多种不同食物的基本数据的数据集。然后使用标准化和编码方法对该数据集进行预处理。为了创建两个机器学习(ML)模型,应用了两种不同的ML算法。本研究使用K近邻(KNN)和Naïve贝叶斯(NB)算法。随后使用预处理数据集对模型进行训练。这些模型还会进行测试,看哪一个模型能最准确地预测病人的理想食物。通过对这些模型的测试,nbalgalgorithm是碳水化合物推荐的最佳方法。该模型的准确率为93.12%。因此,模型被安装在firebase中。另一个包含病人实时读数的数据库也与firebase软件相连。然后医生通过网站给出含有适量碳水化合物的最佳膳食。一份食物建议连同重要指标的数值等信息一起被提供给病人的手机。根据患者的生命体征和所需的碳水化合物摄入量,ML系统特别选择该餐项。
{"title":"Carbohydrate Recommendation for Type-1 Diabetics Patient Using Machine Learning","authors":"S. Sreenivasu, Sakshi Gupta, Ghanshyam Vatsa, Anurag Shrivastava, Swati Vashisht, Aparna Srivastava","doi":"10.1109/IC3I56241.2022.10072919","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072919","url":null,"abstract":"Diabetes is a chronic illness that develops when the blood glucose level is elevated above normal. Diabetes has a variety of reasons, making diagnosis and treatment more difficult than necessary. A patient’s treatment can benefit greatly from a healthy diet. It is important to keep the diet under control so that it doesn’t include an excessive amount of carbohydrates. This study offers assistance in this case by creating a mobile application and website that can suggest a meal item based on the patient’s needs. For this construction, a dataset with basic data about more than fifty different food items is taken from Kaggle. This dataset is then preprocessed utilizingstandardization and encoding methods. To create two Machine Learning (ML)models, two different ML algorithms were applied. In this study, the K Nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms were used. The models are subsequently trained using the preprocessed dataset. The models are also put to the test to see which one forecasts the patient’s ideal food item the most accurately. The NBalgorithm is the best method that may be used for carbohydrate recommendation, according to the testing of these models. This model’s accuracy is 93.12%.The model is therefore installed in the firebase. Another database that contains the patient’s real-time readings is linked to the firebase software as well. The best meal item with the right amount of carbohydrates is then given by the doctor through the website. A food proposal is provided to the patient’s mobile phone together with information like the values of the vital metrics. Based on the patient’s vital signs and required carbohydrate intake, the ML system particularly selects this meal item.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122894772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable AI for Intrusion Detection Systems 入侵检测系统的可解释人工智能
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073356
P. Ramyavarshini, G. K. Sriram, Umamaheswari Rajasekaran, A. Malini
The recent advancements in networks facilitates faster communication to any part of the world. The widespread adoption of Internet of Things in daily life applications proposes networking of gadgets. With the applications of Network through interconnection being increased, the difficulty in maintaining a secure network state becomes a challenge. Intrusion Protection Systems and Intrusion Detection Systems are two widely used tools in network security maintenance. Anomaly based IDS designed with the help of AI, ML and DL algorithms is observed to be more efficient than conventional signature based systems in the literature. Even though the reported accuracy of IDS in all the literature so far is sufficiently high, false alarms raised by the system is a major issue. The lack of explainability in the designed classifier behaviour is an important reason which makes it inevitable to avoid raising false alarms. This paper proposes an Interpretable A-IDS using XAI techniques. LIME and SHAP explanations are easily Interpretable, reducing the chances of raising false alarms.
网络的最新进步促进了与世界任何地方的更快通信。物联网在日常生活中的广泛应用,提出了小工具联网的要求。随着网络互联应用的不断增加,网络安全状态的维护成为一个难题。入侵防御系统和入侵检测系统是网络安全维护中应用最广泛的两种工具。文献中观察到,在AI、ML和DL算法的帮助下设计的基于异常的IDS比传统的基于签名的系统更有效。尽管迄今为止所有文献报道的IDS的准确性都足够高,但系统产生的假警报是一个主要问题。设计的分类器行为缺乏可解释性是导致误报不可避免的重要原因。本文提出了一种使用XAI技术的可解释的A-IDS。LIME和SHAP的解释很容易解释,减少了引发假警报的机会。
{"title":"Explainable AI for Intrusion Detection Systems","authors":"P. Ramyavarshini, G. K. Sriram, Umamaheswari Rajasekaran, A. Malini","doi":"10.1109/IC3I56241.2022.10073356","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073356","url":null,"abstract":"The recent advancements in networks facilitates faster communication to any part of the world. The widespread adoption of Internet of Things in daily life applications proposes networking of gadgets. With the applications of Network through interconnection being increased, the difficulty in maintaining a secure network state becomes a challenge. Intrusion Protection Systems and Intrusion Detection Systems are two widely used tools in network security maintenance. Anomaly based IDS designed with the help of AI, ML and DL algorithms is observed to be more efficient than conventional signature based systems in the literature. Even though the reported accuracy of IDS in all the literature so far is sufficiently high, false alarms raised by the system is a major issue. The lack of explainability in the designed classifier behaviour is an important reason which makes it inevitable to avoid raising false alarms. This paper proposes an Interpretable A-IDS using XAI techniques. LIME and SHAP explanations are easily Interpretable, reducing the chances of raising false alarms.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Applications for Blockchain in Industrial IoT 区块链在工业物联网中的深度学习应用
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073357
Vipul Masal, P. Pavithra, Shivesh Tiwari, Rajesh Singh, Jeidy Panduro-Ramirez, Durgaprasad Gangodkar
The engaging ambitions of regeneration & growth of manufacturing in several nations, as well as the speed, flexibility, or expense benefits that might arise from the architecture of the industrial Internet of Things (IIoT), are attracting considerable interest. While blockchain or machine learning techniques, particularly deep learning, might offer the latest viable use cases for IIoT, they operate in a rather antagonistic manner. Underneath the assumption of information regulatory standards such as information protections, blockchain helps the crucial information collecting for machine learning. However, it may be susceptible to a data breach as a result of big information insights using machine learning. To enable machine learning/blockchain relevant & applicable for a variety of industrialized applications, it is of the utmost essential to have a thorough grasp of their evolution within the framework of IIoT. In this paper, we present a summary & analytics of the opportunity of blockchain as well as machine learning in the IIoT, focusing on the agreement method, preservation, or transmission. This study gives a better knowledge of the protection & confidentiality issues of a blockchain’s vital aspects from the viewpoint of machine learning, and that is beneficial for the creation of viable blockchain alternatives for IIoT.
一些国家对制造业再生和增长的雄心壮志,以及工业物联网(IIoT)架构可能带来的速度、灵活性或成本优势,正吸引着相当大的兴趣。虽然区块链或机器学习技术,特别是深度学习,可能会为工业物联网提供最新的可行用例,但它们的运作方式相当对立。在信息保护等信息监管标准的假设下,区块链有助于机器学习的关键信息收集。然而,由于使用机器学习的大信息洞察,它可能容易受到数据泄露的影响。为了使机器学习/区块链与各种工业化应用相关并适用,在工业物联网框架内彻底掌握它们的演变是至关重要的。在本文中,我们对区块链和机器学习在工业物联网中的机会进行了总结和分析,重点是协议方法、保存或传输。本研究从机器学习的角度更好地了解了区块链重要方面的保护和保密问题,这有利于为工业物联网创建可行的区块链替代方案。
{"title":"Deep Learning Applications for Blockchain in Industrial IoT","authors":"Vipul Masal, P. Pavithra, Shivesh Tiwari, Rajesh Singh, Jeidy Panduro-Ramirez, Durgaprasad Gangodkar","doi":"10.1109/IC3I56241.2022.10073357","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073357","url":null,"abstract":"The engaging ambitions of regeneration & growth of manufacturing in several nations, as well as the speed, flexibility, or expense benefits that might arise from the architecture of the industrial Internet of Things (IIoT), are attracting considerable interest. While blockchain or machine learning techniques, particularly deep learning, might offer the latest viable use cases for IIoT, they operate in a rather antagonistic manner. Underneath the assumption of information regulatory standards such as information protections, blockchain helps the crucial information collecting for machine learning. However, it may be susceptible to a data breach as a result of big information insights using machine learning. To enable machine learning/blockchain relevant & applicable for a variety of industrialized applications, it is of the utmost essential to have a thorough grasp of their evolution within the framework of IIoT. In this paper, we present a summary & analytics of the opportunity of blockchain as well as machine learning in the IIoT, focusing on the agreement method, preservation, or transmission. This study gives a better knowledge of the protection & confidentiality issues of a blockchain’s vital aspects from the viewpoint of machine learning, and that is beneficial for the creation of viable blockchain alternatives for IIoT.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Deep Transfer Learning Approach For The Detection Of Vector-Borne Diseases 用于媒介传播疾病检测的混合深度迁移学习方法
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072576
Inderpreet Kaur, A. Sandhu, Yogesh Kumar
Vector-borne diseases considerably impact the worldwide population’s health and economic well-being. However, training deep-learning models requires significant time and training data. Therefore, a unique hybrid transfer learning approach was proposed for detecting vector-borne diseases (VBD) to solve these issues while retaining high accuracy. In the first phase, malaria and Lyme benchmark datasets were obtained. Then VGG16, VGG19, MobileNetV2, and DenseNet 169 were compared to the hybrid model results (MobileNetV2+DenseNet 169). The effectiveness of the hybrid transfer learning method was evaluated using several performance measures, namely precision, loss, accuracy, AUC and RMSE. On the malaria dataset, the proposed model (MobileNetV2+DenseNet 169) achieved the most excellent classification accuracy of 99.9%, and on the Lyme dataset, 99.3%.
病媒传播的疾病严重影响全世界人口的健康和经济福祉。然而,训练深度学习模型需要大量的时间和训练数据。为此,提出了一种独特的混合迁移学习方法来解决这些问题,同时保持较高的准确性。在第一阶段,获得疟疾和莱姆病基准数据集。然后将VGG16、VGG19、MobileNetV2和DenseNet 169与混合模型结果(MobileNetV2+DenseNet 169)进行比较。使用精度、损失、准确度、AUC和RMSE等性能指标对混合迁移学习方法的有效性进行了评价。在疟疾数据集上,所提出的模型(MobileNetV2+DenseNet 169)的分类准确率最高,达到99.9%,在莱姆病数据集上达到99.3%。
{"title":"A Hybrid Deep Transfer Learning Approach For The Detection Of Vector-Borne Diseases","authors":"Inderpreet Kaur, A. Sandhu, Yogesh Kumar","doi":"10.1109/IC3I56241.2022.10072576","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072576","url":null,"abstract":"Vector-borne diseases considerably impact the worldwide population’s health and economic well-being. However, training deep-learning models requires significant time and training data. Therefore, a unique hybrid transfer learning approach was proposed for detecting vector-borne diseases (VBD) to solve these issues while retaining high accuracy. In the first phase, malaria and Lyme benchmark datasets were obtained. Then VGG16, VGG19, MobileNetV2, and DenseNet 169 were compared to the hybrid model results (MobileNetV2+DenseNet 169). The effectiveness of the hybrid transfer learning method was evaluated using several performance measures, namely precision, loss, accuracy, AUC and RMSE. On the malaria dataset, the proposed model (MobileNetV2+DenseNet 169) achieved the most excellent classification accuracy of 99.9%, and on the Lyme dataset, 99.3%.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130336802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using AIG in Verilog HDL, Autonomous Testing in a Family of Wien Bridge Cross Transducers 利用AIG在Verilog HDL中的应用,对一系列Wien桥交叉换能器进行自主测试
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072853
K. N. R. Praveen, Gadug Sudhamsu
This research reports on the software configuration of automated fault detection and recognition using neural networks (ANNs) in a class of 13.6 cross actuators. According to the findings, the suggested flaw detector is ideal for integrating knowledge into the devices in a way that is living thing. The seven often recurring defects in a batch of these sensors are directly determined by the automated fault tester that is being demonstrated. In this study, the suggested automated defect detector is trained using an ANN-based binary class system. If any of the mistakes occurs, logic Programming is applied to define a high or “1” output, whereas the returning is calculated whether the other 6 failures occurred lowest or “0”. The input outputs from the Or CAD programme are used as incoming signal, and indeed the produced train parameters, i.e., amplitude and biased of the artificial neural tool of Math, have been used.
本研究报告了在一类13.6个交叉执行器中使用神经网络(ann)进行自动故障检测和识别的软件配置。根据研究结果,建议的探伤仪是将知识以一种有生命的方式整合到设备中的理想选择。在一批传感器中,七个经常重复出现的缺陷直接由正在演示的自动故障测试器确定。在本研究中,建议的自动缺陷检测器使用基于人工神经网络的二进制分类系统进行训练。如果发生任何错误,则应用逻辑编程来定义高输出或“1”输出,而返回则计算其他6个失败是发生最低还是“0”。Or CAD程序的输入输出用作输入信号,并且确实使用了数学人工神经工具产生的列车参数,即振幅和偏置。
{"title":"Using AIG in Verilog HDL, Autonomous Testing in a Family of Wien Bridge Cross Transducers","authors":"K. N. R. Praveen, Gadug Sudhamsu","doi":"10.1109/IC3I56241.2022.10072853","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072853","url":null,"abstract":"This research reports on the software configuration of automated fault detection and recognition using neural networks (ANNs) in a class of 13.6 cross actuators. According to the findings, the suggested flaw detector is ideal for integrating knowledge into the devices in a way that is living thing. The seven often recurring defects in a batch of these sensors are directly determined by the automated fault tester that is being demonstrated. In this study, the suggested automated defect detector is trained using an ANN-based binary class system. If any of the mistakes occurs, logic Programming is applied to define a high or “1” output, whereas the returning is calculated whether the other 6 failures occurred lowest or “0”. The input outputs from the Or CAD programme are used as incoming signal, and indeed the produced train parameters, i.e., amplitude and biased of the artificial neural tool of Math, have been used.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation 成功实施物联网网络的安全攻击框架、问题分类和配置策略
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073429
V. Bansal, Siddharth Pandey, Surendra Kumar Shukla, Devendra Singh, Sunitha Aravind Rathod, J. L. Arias-Gonzáles
The IEEE 802.15.4 standard offers a number of security requirements that provide varying degrees of protections at the link layer. The decision of which security level to use while collecting IoT based nodes is critical since it impacts safety and also impacts network speed. In this paper, a network security approach takes collection and recommended risks into account, taking into account the dynamics of cyber threat & total efficiency. The model findings show that the concept may select the best secure protocols depending on cybersecurity risks, level of maintenance, and changeable energy gathered. When compared to conventional methods, the proposed solution can increase work hours, resulting in enhanced network quality. Furthermore, the proposed security setup technique may suit a wide range of service needs.
IEEE 802.15.4标准提供了许多在链路层提供不同程度保护的安全要求。在收集基于物联网的节点时,决定使用哪种安全级别至关重要,因为它会影响安全性,也会影响网络速度。在本文中,网络安全方法考虑到收集和推荐风险,考虑到网络威胁的动态和总效率。模型结果表明,该概念可以根据网络安全风险、维护水平和收集的可变能量来选择最佳安全协议。与传统方法相比,该方案可以增加工作时间,从而提高网络质量。此外,所建议的安全设置技术可能适合广泛的服务需求。
{"title":"A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation","authors":"V. Bansal, Siddharth Pandey, Surendra Kumar Shukla, Devendra Singh, Sunitha Aravind Rathod, J. L. Arias-Gonzáles","doi":"10.1109/IC3I56241.2022.10073429","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073429","url":null,"abstract":"The IEEE 802.15.4 standard offers a number of security requirements that provide varying degrees of protections at the link layer. The decision of which security level to use while collecting IoT based nodes is critical since it impacts safety and also impacts network speed. In this paper, a network security approach takes collection and recommended risks into account, taking into account the dynamics of cyber threat & total efficiency. The model findings show that the concept may select the best secure protocols depending on cybersecurity risks, level of maintenance, and changeable energy gathered. When compared to conventional methods, the proposed solution can increase work hours, resulting in enhanced network quality. Furthermore, the proposed security setup technique may suit a wide range of service needs.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130670086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survival Prediction of a Patient afterward a Heart Attack by Machine Learning 用机器学习预测心脏病发作后患者的生存
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073329
Biswajit Giri, Suman Kumari Agarwal, Nandani Kumari, Rana Majumder, Sumita Gupta, Anirban Mitra
Heart attack is a major threat to human life. It occurs in one or more coronary arteries refilled by the oxygen-rich blood, which also supplies into the heart muscle, suddenly becomes blocked, and unfortunately, a few heart muscle sections can’t get sufficient oxygen. In past, most patients suffered heart attacks at some stage in life. Unfortunately, some of them lost their lives due to this. When the non-survival and survival variables both are examined that determines whether a patient will survive for one more year after suffering from a heart attack. A supervised learning technique has been applied to the Echocardiogram Dataset. The experimental outcomes show that the proposed methodology applied with several data preprocessing approaches achieved a decent 94.74% classification accuracy.
心脏病是对人类生命的重大威胁。它发生在一个或多个冠状动脉,这些冠状动脉被富含氧气的血液重新填充,这些血液也供应给心肌,突然被阻塞,不幸的是,一些心肌部分无法获得足够的氧气。过去,大多数病人在人生的某个阶段都会心脏病发作。不幸的是,他们中的一些人因此失去了生命。当非生存变量和生存变量都被检查时,这决定了病人在心脏病发作后是否能再活一年。一种监督学习技术已应用于超声心动图数据集。实验结果表明,该方法与几种数据预处理方法相结合,分类准确率达到了94.74%。
{"title":"Survival Prediction of a Patient afterward a Heart Attack by Machine Learning","authors":"Biswajit Giri, Suman Kumari Agarwal, Nandani Kumari, Rana Majumder, Sumita Gupta, Anirban Mitra","doi":"10.1109/IC3I56241.2022.10073329","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073329","url":null,"abstract":"Heart attack is a major threat to human life. It occurs in one or more coronary arteries refilled by the oxygen-rich blood, which also supplies into the heart muscle, suddenly becomes blocked, and unfortunately, a few heart muscle sections can’t get sufficient oxygen. In past, most patients suffered heart attacks at some stage in life. Unfortunately, some of them lost their lives due to this. When the non-survival and survival variables both are examined that determines whether a patient will survive for one more year after suffering from a heart attack. A supervised learning technique has been applied to the Echocardiogram Dataset. The experimental outcomes show that the proposed methodology applied with several data preprocessing approaches achieved a decent 94.74% classification accuracy.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling of an Intelligent Voice System using MI Algorithm for E-Business 基于MI算法的电子商务智能语音系统建模
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073241
V. Kiruthiga, Sunanda Kondapalli, Varun Gupta, R. Aarthy, J. Sasidevi, C. S. Kumar
The next generation will require of such commerce site with the renaissance of conventional technology to more current technology and use of advanced technology, where a large portion of e-commerce are presently created on back of such revolution and inventive breakthroughs like robotization. Most of businesses or owner(s) of these sites are sending off more unique sites rather than conventional list and static sites, so machine learning, augmented with man-made brainpower, and deep learning, which are in demand and profoundly necessary, should be integrated into the present e-commerce sites to be best and profitable for the owners of these sites. The importance of artificial intelligence in various spheres of business and life has increased as a result of the accelerated technological advancement. The use of AI in voice recognition helps organisations and individuals understand how to provide stakeholders with better services and effectively completes the task. Therefore, this work focuses on utilising regression analysis to analyse the critical factors of employing AI in speech recognition for a successful multipurpose Machine Learning platform.
下一代将需要这样的电子商务网站,随着传统技术的复兴,更现代的技术和先进技术的使用,其中很大一部分电子商务目前是在这种革命和创造性突破的基础上创造的,比如机器人化。这些网站的大多数企业或所有者都在发送更独特的网站,而不是传统的列表和静态网站,因此机器学习,加上人工智能和深度学习,这些都是需求和非常必要的,应该整合到目前的电子商务网站中,为这些网站的所有者提供最好的和有利可图的服务。随着技术进步的加速,人工智能在商业和生活各个领域的重要性也在增加。在语音识别中使用人工智能可以帮助组织和个人了解如何为利益相关者提供更好的服务并有效地完成任务。因此,这项工作的重点是利用回归分析来分析在语音识别中使用人工智能的关键因素,以实现成功的多用途机器学习平台。
{"title":"Modelling of an Intelligent Voice System using MI Algorithm for E-Business","authors":"V. Kiruthiga, Sunanda Kondapalli, Varun Gupta, R. Aarthy, J. Sasidevi, C. S. Kumar","doi":"10.1109/IC3I56241.2022.10073241","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073241","url":null,"abstract":"The next generation will require of such commerce site with the renaissance of conventional technology to more current technology and use of advanced technology, where a large portion of e-commerce are presently created on back of such revolution and inventive breakthroughs like robotization. Most of businesses or owner(s) of these sites are sending off more unique sites rather than conventional list and static sites, so machine learning, augmented with man-made brainpower, and deep learning, which are in demand and profoundly necessary, should be integrated into the present e-commerce sites to be best and profitable for the owners of these sites. The importance of artificial intelligence in various spheres of business and life has increased as a result of the accelerated technological advancement. The use of AI in voice recognition helps organisations and individuals understand how to provide stakeholders with better services and effectively completes the task. Therefore, this work focuses on utilising regression analysis to analyse the critical factors of employing AI in speech recognition for a successful multipurpose Machine Learning platform.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"59 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120898027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1