首页 > 最新文献

2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Data Mining based Handling Missing Data 基于缺失数据处理的数据挖掘
A. Dubey, A. Rasool
Today, a huge amount of data are generated in many applications than ever before. However, most of the application's data are affected by the issue of missing values. This issue has gained significant attention throughout the statistical research. Several obvious examples involve repositories related to the management of equipment, business applications, and surveys. One of the usual ways to handle this issue is to fill the value using imputation. Several imputation techniques have been proposed until now to handle the missing data. With the rapidly increasing size of the dataset, a modern imputation approach algorithm is required. In this paper, we provide an extensive overview of the current imputation methods, with a special focus on algorithms utilizing the local or global correlation available within the dataset. Furthermore, the paper shows how the prediction made can be validated and some possible future directions. This paper is expected to give the researchers a good grasp of the current trends in this domain and to enable them to create a more robust and efficient algorithm.
今天,在许多应用程序中产生的数据量比以往任何时候都要大。但是,大多数应用程序的数据都受到缺失值问题的影响。这个问题在整个统计研究中得到了极大的关注。几个明显的例子涉及与设备管理、业务应用程序和调查相关的存储库。处理此问题的常用方法之一是使用imputation填充值。到目前为止,已经提出了几种用于处理缺失数据的imputation技术。随着数据集规模的快速增长,需要一种现代的插值方法。在本文中,我们对当前的imputation方法进行了广泛的概述,特别关注利用数据集中可用的局部或全局相关性的算法。此外,本文还说明了如何验证所做的预测和一些可能的未来方向。希望本文能让研究者更好地掌握该领域的发展趋势,并使他们能够创造出更加鲁棒和高效的算法。
{"title":"Data Mining based Handling Missing Data","authors":"A. Dubey, A. Rasool","doi":"10.1109/I-SMAC47947.2019.9032631","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032631","url":null,"abstract":"Today, a huge amount of data are generated in many applications than ever before. However, most of the application's data are affected by the issue of missing values. This issue has gained significant attention throughout the statistical research. Several obvious examples involve repositories related to the management of equipment, business applications, and surveys. One of the usual ways to handle this issue is to fill the value using imputation. Several imputation techniques have been proposed until now to handle the missing data. With the rapidly increasing size of the dataset, a modern imputation approach algorithm is required. In this paper, we provide an extensive overview of the current imputation methods, with a special focus on algorithms utilizing the local or global correlation available within the dataset. Furthermore, the paper shows how the prediction made can be validated and some possible future directions. This paper is expected to give the researchers a good grasp of the current trends in this domain and to enable them to create a more robust and efficient algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multidisciplinary Approach of Artificial Intelligence over Medical Imaging: A Review, Challenges, Recent Opportunities for Research 人工智能在医学影像上的多学科方法:综述,挑战,最近的研究机会
A. Tiwari, Manisha L Chaudhari, Ankita Rai
Multidisciplinary approach of artificial intelligence is revolutionizing the traditional technologies used in medical image computing, radiology imaging, medical diagnoses and features based disease identification [1], [2]. In this paper, overview of artificial intelligence and its application over medical images, recent challenges, deeper technological background regarding betterment/innovation healthcare, real life clinical application with parameters of diagnosis, will improve patient health and feature based disease identification. It provides methodologies in the field of medical imaging by developing self driven and intelligent algorithm that manages and extracts meaningful information out of raw data present in the images. It helps in early diagnosis and treatment of the diseases. This paper focuses on various aspects and issues on the growing role of medical image, fundamental technical advantage of AI over traditional patterns for the betterment of human lives. From this research work, reader understands deeper technological aspects for smart algorithms regarding diseases and patient care.
人工智能的多学科方法正在彻底改变医学图像计算、放射学成像、医学诊断和基于特征的疾病识别等传统技术[1],[2]。本文概述了人工智能及其在医学图像上的应用,最近的挑战,在改善/创新医疗保健方面的更深层次的技术背景,具有诊断参数的现实生活临床应用,将改善患者健康和基于特征的疾病识别。它通过开发自我驱动和智能算法,从图像中存在的原始数据中管理和提取有意义的信息,为医学成像领域提供了方法。它有助于疾病的早期诊断和治疗。本文重点讨论了医学图像日益增长的作用,人工智能相对于传统模式的基本技术优势,以改善人类生活的各个方面和问题。从这项研究工作中,读者了解了有关疾病和患者护理的智能算法的更深层次的技术方面。
{"title":"Multidisciplinary Approach of Artificial Intelligence over Medical Imaging: A Review, Challenges, Recent Opportunities for Research","authors":"A. Tiwari, Manisha L Chaudhari, Ankita Rai","doi":"10.1109/I-SMAC47947.2019.9032566","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032566","url":null,"abstract":"Multidisciplinary approach of artificial intelligence is revolutionizing the traditional technologies used in medical image computing, radiology imaging, medical diagnoses and features based disease identification [1], [2]. In this paper, overview of artificial intelligence and its application over medical images, recent challenges, deeper technological background regarding betterment/innovation healthcare, real life clinical application with parameters of diagnosis, will improve patient health and feature based disease identification. It provides methodologies in the field of medical imaging by developing self driven and intelligent algorithm that manages and extracts meaningful information out of raw data present in the images. It helps in early diagnosis and treatment of the diseases. This paper focuses on various aspects and issues on the growing role of medical image, fundamental technical advantage of AI over traditional patterns for the betterment of human lives. From this research work, reader understands deeper technological aspects for smart algorithms regarding diseases and patient care.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Based Handy Fuel Flow Measurement 基于物联网的便捷燃油流量测量
Pavan Manjunath, Pritam Gajkumar
The adoption of the newer technologies for measuring the fuel flow into the vehicle fuel tank is a very feasible option, and gives accurate values without tampering the value count of the fuel flow's digital data values. With the help of digital measurement sensors the proposed Internet of Things (IoT) based fuel flow monitoring system helps to obtain a precise level of fuel count. This research paper provides an overview of the IOT based fuel flow digital measurement sensors, by sending the real-time inputs to user mobile, about how much petrol or diesel flow is pumped into vehicle tank. Therefore, it is not necessary that user should depend on the petrol pump digital machine display unit, for gauging the fuel flow into the fuel tank of the vehicle. These devices will always act as a lightweight portable device and the user can carry these lightweight portable devices anywhere and at any time.
采用更新的技术测量进入车辆油箱的燃油流量是一种非常可行的选择,并且在不篡改燃油流量数字数据值计数的情况下给出准确的数值。在数字测量传感器的帮助下,基于物联网(IoT)的燃油流量监测系统有助于获得精确的燃油计数水平。本研究报告概述了基于物联网的燃油流量数字测量传感器,通过向移动用户发送实时输入,了解向车辆油箱泵入的汽油或柴油流量。因此,用户没有必要依靠油泵数显单元来测量进入车辆油箱的燃油流量。这些设备将始终充当轻便的便携式设备,用户可以随时随地携带这些轻便的便携式设备。
{"title":"IoT Based Handy Fuel Flow Measurement","authors":"Pavan Manjunath, Pritam Gajkumar","doi":"10.1109/I-SMAC47947.2019.9032467","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032467","url":null,"abstract":"The adoption of the newer technologies for measuring the fuel flow into the vehicle fuel tank is a very feasible option, and gives accurate values without tampering the value count of the fuel flow's digital data values. With the help of digital measurement sensors the proposed Internet of Things (IoT) based fuel flow monitoring system helps to obtain a precise level of fuel count. This research paper provides an overview of the IOT based fuel flow digital measurement sensors, by sending the real-time inputs to user mobile, about how much petrol or diesel flow is pumped into vehicle tank. Therefore, it is not necessary that user should depend on the petrol pump digital machine display unit, for gauging the fuel flow into the fuel tank of the vehicle. These devices will always act as a lightweight portable device and the user can carry these lightweight portable devices anywhere and at any time.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ECG Electrodes for Smart ECG Monitoring for biomedical applications 用于生物医学应用的智能心电监测的ECG电极
Malti Bansal, Bani Gandhi
There has been an expeditious rise in various complicated and vulnerable diseases in the world today. The most critical set of diseases are Cardiovascular Diseases (CVDs). CVDs are affecting a lot of population present across the globe. As these diseases are unpredictable in nature, medical facilities and diagnosis should be made more prompt and effective. As the world population is rapidly increasing, there is a massive burden on the healthcare industry. The healthcare systems should be portable, more connected and most importantly reliable. This can only be accomplished with the help of various technologies. First and foremost, are the sensors used to measure the Electrocardiogram (ECG) for various CVDs. Decades ago, Ag/AgCl gel based electrodes were used to measure the ECG. However, due to their various disadvantages, the medical fraternity moved on to using dry electrodes. Various dry electrodes were developed and used for this purpose. Further, in the category of dry electrodes, Carbon Nanotubes (CNTs) based ECG electrodes have shown great potential in this domain. Due to the various advantages of CNTs like flexibility, conductivity, and lighter weight, it can be used to fabricate electrodes or can be embedded into the textiles. Thus, people suffering from CVDs can incorporate these electrodes / sensors in their daily lives for early detection of the disease, and the person's life can be saved. As CNTs are smart materials, easily and readily available, and most importantly available in low costs, they can be used for fabricating smart devices. These characteristics of CNTs make them a perfect candidate for biomedical applications. This paper reviews various works related to fabrication of multiwall carbon nanotube (MWCNT) based electrodes, for ECG monitoring.
当今世界各种复杂易危疾病迅速增多。最严重的疾病是心血管疾病(cvd)。心血管疾病正在影响全球很多人。由于这些疾病本质上是不可预测的,医疗设施和诊断应该更加及时和有效。随着世界人口的快速增长,医疗保健行业承受着巨大的负担。医疗保健系统应该是便携的,连接更紧密,最重要的是可靠的。这只能在各种技术的帮助下完成。首先是用于测量各种心血管疾病的心电图(ECG)的传感器。几十年前,Ag/AgCl凝胶电极被用于测量ECG。然而,由于它们的各种缺点,医学界转向使用干电极。为此开发并使用了各种干电极。此外,在干电极类别中,基于碳纳米管(CNTs)的ECG电极在该领域显示出巨大的潜力。由于碳纳米管具有柔韧性、导电性和重量较轻等优点,因此可以用于制造电极或嵌入纺织品中。因此,患有心血管疾病的人可以在日常生活中使用这些电极/传感器,以便及早发现疾病,从而挽救患者的生命。由于碳纳米管是一种智能材料,易于获得,最重要的是成本低,因此可以用于制造智能设备。碳纳米管的这些特性使其成为生物医学应用的完美候选者。本文综述了多壁碳纳米管(MWCNT)电极在心电监测方面的研究进展。
{"title":"ECG Electrodes for Smart ECG Monitoring for biomedical applications","authors":"Malti Bansal, Bani Gandhi","doi":"10.1109/I-SMAC47947.2019.9032663","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032663","url":null,"abstract":"There has been an expeditious rise in various complicated and vulnerable diseases in the world today. The most critical set of diseases are Cardiovascular Diseases (CVDs). CVDs are affecting a lot of population present across the globe. As these diseases are unpredictable in nature, medical facilities and diagnosis should be made more prompt and effective. As the world population is rapidly increasing, there is a massive burden on the healthcare industry. The healthcare systems should be portable, more connected and most importantly reliable. This can only be accomplished with the help of various technologies. First and foremost, are the sensors used to measure the Electrocardiogram (ECG) for various CVDs. Decades ago, Ag/AgCl gel based electrodes were used to measure the ECG. However, due to their various disadvantages, the medical fraternity moved on to using dry electrodes. Various dry electrodes were developed and used for this purpose. Further, in the category of dry electrodes, Carbon Nanotubes (CNTs) based ECG electrodes have shown great potential in this domain. Due to the various advantages of CNTs like flexibility, conductivity, and lighter weight, it can be used to fabricate electrodes or can be embedded into the textiles. Thus, people suffering from CVDs can incorporate these electrodes / sensors in their daily lives for early detection of the disease, and the person's life can be saved. As CNTs are smart materials, easily and readily available, and most importantly available in low costs, they can be used for fabricating smart devices. These characteristics of CNTs make them a perfect candidate for biomedical applications. This paper reviews various works related to fabrication of multiwall carbon nanotube (MWCNT) based electrodes, for ECG monitoring.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN based speaker recognition in language and text-independent small scale system 基于CNN的语言文本独立小型系统说话人识别
Rohan Jagiasi, Shubham Ghosalkar, Punit Kulal, A. Bharambe
Speaker Recognition is the ability of the system to recognize the speaker from the set of speaker samples available in the system. It is of 2 types, one uses a keyword, called text-dependent systems, and another one can recognize the voice in any language/text, also called as text-independent speaker recognition. In this paper, a text-independent, language-independent speaker recognition system is implemented using dense & convolutional neural networks. Speaker recognition has found several applications in upcoming electronic products like personal/home assistants, telephone banking and biometric identification. In this paper, we explore a system that uses MFCC along with DNN and CNN as the model for building a speaker recognition system.
说话人识别是系统从系统中可用的说话人样本中识别说话人的能力。它有两种类型,一种使用关键字,称为文本依赖系统,另一种可以识别任何语言/文本的语音,也称为文本独立说话人识别。本文利用密集卷积神经网络实现了一个文本无关、语言无关的说话人识别系统。说话人识别已经在一些即将问世的电子产品中得到了应用,比如个人/家庭助理、电话银行和生物识别。在本文中,我们探索了一个使用MFCC与DNN和CNN作为模型来构建说话人识别系统的系统。
{"title":"CNN based speaker recognition in language and text-independent small scale system","authors":"Rohan Jagiasi, Shubham Ghosalkar, Punit Kulal, A. Bharambe","doi":"10.1109/I-SMAC47947.2019.9032667","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032667","url":null,"abstract":"Speaker Recognition is the ability of the system to recognize the speaker from the set of speaker samples available in the system. It is of 2 types, one uses a keyword, called text-dependent systems, and another one can recognize the voice in any language/text, also called as text-independent speaker recognition. In this paper, a text-independent, language-independent speaker recognition system is implemented using dense & convolutional neural networks. Speaker recognition has found several applications in upcoming electronic products like personal/home assistants, telephone banking and biometric identification. In this paper, we explore a system that uses MFCC along with DNN and CNN as the model for building a speaker recognition system.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"112 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Android Application Development: A Brief Overview of Android Platforms and Evolution of Security Systems Android应用开发:Android平台和安全系统的发展概述
Anirban Sarkar, Ayush Goyal, David Hicks, Debadrita Sarkar, Saikat Hazra
With the advent of new mobile technologies, the mobile application industry is advancing rapidly. Consisting of several operating systems like symbian OS, iOS, blackberry, etc., Android OS is recognized as the most widely used, popular and user-friendly mobile platform. This open-source linux kernel-based operating system offers high flexibility due to its customization properties making it a dominant mobile operating system. Android applications are programmed in java language. Google android SDK delivers a special software stack that provides developers an easy platform to develop android applications. Moreover, developers can make use of existing java IDEs which provides flexibility to the developers. Java libraries are predominant in the process of third-party application development. Cross-platform approaches make sure that developers do not have to develop platform-dependent applications. With the help of these approaches, an application can be deployed to several platforms without the need for changes in coding. However, android is more prone to security vulnerabilities which the majority of the users do not take into account. Any android developer can upload their application on the android market which can cause a security threat to any android device. These applications do not have to go through rigorous security checks. In this paper, a layered approach for android application development along with various cross-platform approaches is discussed. Moreover, a brief introduction to new android platforms including security framework as well as security systems is discussed.
随着新的移动技术的出现,移动应用行业正在迅速发展。Android操作系统由symbian OS、iOS、blackberry等多个操作系统组成,被公认为是使用最广泛、最流行、最人性化的移动平台。这个基于linux内核的开源操作系统提供了高度的灵活性,因为它的自定义属性使其成为主导的移动操作系统。Android应用程序采用java语言编写。Google android SDK提供了一个特殊的软件栈,为开发者提供了一个简单的平台来开发android应用程序。此外,开发人员可以利用现有的java ide,这为开发人员提供了灵活性。Java库在第三方应用程序开发过程中占主导地位。跨平台方法确保开发人员不必开发依赖于平台的应用程序。在这些方法的帮助下,应用程序可以部署到多个平台,而无需更改编码。然而,android更容易出现安全漏洞,这是大多数用户没有考虑到的。任何android开发者都可以在android市场上上传他们的应用程序,这可能会对任何android设备造成安全威胁。这些应用程序不需要经过严格的安全检查。本文讨论了android应用程序开发的分层方法以及各种跨平台方法。此外,还简要介绍了新的android平台,包括安全框架和安全系统。
{"title":"Android Application Development: A Brief Overview of Android Platforms and Evolution of Security Systems","authors":"Anirban Sarkar, Ayush Goyal, David Hicks, Debadrita Sarkar, Saikat Hazra","doi":"10.1109/I-SMAC47947.2019.9032440","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032440","url":null,"abstract":"With the advent of new mobile technologies, the mobile application industry is advancing rapidly. Consisting of several operating systems like symbian OS, iOS, blackberry, etc., Android OS is recognized as the most widely used, popular and user-friendly mobile platform. This open-source linux kernel-based operating system offers high flexibility due to its customization properties making it a dominant mobile operating system. Android applications are programmed in java language. Google android SDK delivers a special software stack that provides developers an easy platform to develop android applications. Moreover, developers can make use of existing java IDEs which provides flexibility to the developers. Java libraries are predominant in the process of third-party application development. Cross-platform approaches make sure that developers do not have to develop platform-dependent applications. With the help of these approaches, an application can be deployed to several platforms without the need for changes in coding. However, android is more prone to security vulnerabilities which the majority of the users do not take into account. Any android developer can upload their application on the android market which can cause a security threat to any android device. These applications do not have to go through rigorous security checks. In this paper, a layered approach for android application development along with various cross-platform approaches is discussed. Moreover, a brief introduction to new android platforms including security framework as well as security systems is discussed.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Investigation and classification of cyber-crimes through IDS and SVM algorithm 基于IDS和SVM算法的网络犯罪调查与分类
Hamid Zolfi, H. Ghorbani, M. Ahmadzadegan
The evolution of information technology and the development of usage of the high speed internet has brought about changes in the human daily activities. And also access to a large amount of information available through Internet and network platform have led to an increase in the knowledge level of individuals. But along with these changes that have changed the quality of life, and despite all the features and capabilities of the Internet, the criminals have been able to enter the organizational computer systems, and a new type of crime known as computer crime has been emerged which has doubled the importance of tracking, detecting and dealing with these crimes. The spread of computer crime in different countries has led to the adoption of appropriate solutions through the development of relevant laws and raising public awareness and also detection and counteraction of computer crimes requires high level of knowledge, skills and technology. In this way, today intrusion detection and prevention systems along with firewalls are the main mechanisms for achieving the network security. purpose of this study is to identify meaningful patterns for categorizing computer attacks as a solution for Detecting as much as possible malicious attacks and anticipating future criminal activities by using the intrusion detection systems and focus on evidence gathering about suspicious activities and therefore increasing network security. For this purpose, the present study investigates computer crimes that occurred through the traffic network of a petrochemical subsidiary company in a given period of time through the attacks modeling using the SVM algorithm.
信息技术的发展和高速互联网的使用给人类的日常活动带来了变化。而且通过互联网和网络平台可以获取大量的信息,导致了个人知识水平的提高。但是,随着这些改变了生活质量的变化,尽管互联网具有所有的特点和功能,犯罪分子已经能够进入组织的计算机系统,并且出现了一种被称为计算机犯罪的新型犯罪,这使得跟踪,检测和处理这些犯罪的重要性增加了一倍。由于电脑罪行在不同国家蔓延,因此必须透过制定相关法律及提高公众意识,采取适当的解决办法。此外,侦测及打击电脑罪行亦需要高水平的知识、技能及科技。在这种情况下,入侵检测和防御系统与防火墙一起成为当今实现网络安全的主要机制。本研究的目的是识别有意义的模式,将计算机攻击分类为一种解决方案,通过使用入侵检测系统来检测尽可能多的恶意攻击和预测未来的犯罪活动,并专注于收集可疑活动的证据,从而提高网络安全性。为此,本研究利用SVM算法对某石化子公司在给定时间段内通过交通网络发生的计算机犯罪进行了研究。
{"title":"Investigation and classification of cyber-crimes through IDS and SVM algorithm","authors":"Hamid Zolfi, H. Ghorbani, M. Ahmadzadegan","doi":"10.1109/I-SMAC47947.2019.9032536","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032536","url":null,"abstract":"The evolution of information technology and the development of usage of the high speed internet has brought about changes in the human daily activities. And also access to a large amount of information available through Internet and network platform have led to an increase in the knowledge level of individuals. But along with these changes that have changed the quality of life, and despite all the features and capabilities of the Internet, the criminals have been able to enter the organizational computer systems, and a new type of crime known as computer crime has been emerged which has doubled the importance of tracking, detecting and dealing with these crimes. The spread of computer crime in different countries has led to the adoption of appropriate solutions through the development of relevant laws and raising public awareness and also detection and counteraction of computer crimes requires high level of knowledge, skills and technology. In this way, today intrusion detection and prevention systems along with firewalls are the main mechanisms for achieving the network security. purpose of this study is to identify meaningful patterns for categorizing computer attacks as a solution for Detecting as much as possible malicious attacks and anticipating future criminal activities by using the intrusion detection systems and focus on evidence gathering about suspicious activities and therefore increasing network security. For this purpose, the present study investigates computer crimes that occurred through the traffic network of a petrochemical subsidiary company in a given period of time through the attacks modeling using the SVM algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125603741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Detailed Motor Selection for Electric Vehicle Traction System 电动汽车牵引系统电机选型详细分析
Mayuri S. Patil, S. Dhamal
Electric vehicle is the upcoming buzz word in the coming decade. The main component driving the vehicle is motor and its driving mechanism, that efficiently utilises the power stored in the batteries. Industrially, variety of electric motors is available to be used in traction system. Along with selection of motor, proper choice of motor drive mechanism is essential for design and operation of electric vehicle. In this paper, a detailed review of various electric motors available will be judged for its suitability for vehicle applications. Also, it is essential for the traction system to access various drive mechanism for efficient operation of electric vehicle.
电动汽车是未来十年的热门词汇。驱动车辆的主要部件是电机及其驱动机构,它有效地利用了电池中储存的电力。工业上,各种各样的电动机可用于牵引系统。在电动机选择的同时,电动机驱动机构的合理选择对电动汽车的设计和运行至关重要。在本文中,将详细回顾现有的各种电动机,以判断其是否适合车辆应用。为保证电动汽车的高效运行,牵引系统必须接入各种驱动机构。
{"title":"A Detailed Motor Selection for Electric Vehicle Traction System","authors":"Mayuri S. Patil, S. Dhamal","doi":"10.1109/I-SMAC47947.2019.9032616","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032616","url":null,"abstract":"Electric vehicle is the upcoming buzz word in the coming decade. The main component driving the vehicle is motor and its driving mechanism, that efficiently utilises the power stored in the batteries. Industrially, variety of electric motors is available to be used in traction system. Along with selection of motor, proper choice of motor drive mechanism is essential for design and operation of electric vehicle. In this paper, a detailed review of various electric motors available will be judged for its suitability for vehicle applications. Also, it is essential for the traction system to access various drive mechanism for efficient operation of electric vehicle.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Enhancement Scheme in Mobile Wireless Sensor Networks Using RAPD Approach 基于RAPD方法的移动无线传感器网络安全增强方案
Abhijit S. Bodhe, Jagdisha N.
Now a day's social media is trending towards wireless technology for a wire-free and faster communication, especially mobile devices are interconnected together to create a complete network in an organization or even in the home, where the detection and identification of fraud devices play an important role. These devices can be a potential threat to the entire network. The proposed method focuses on identification and eradication of fake/rouge access points which is installed by mistake or intentionally by end user, using beacon frame this can possible to identify and remove such rouge devices from the network in faster and cheaper rate, without any additional hardware's, The paper will surly an extension for security enhancements with RAPD algorithm.
现在一天的社交媒体都趋向于无线技术,以实现无线和更快的通信,特别是移动设备相互连接在一起,在组织甚至家庭中形成一个完整的网络,其中欺诈设备的检测和识别起着重要的作用。这些设备可能对整个网络构成潜在威胁。所提出的方法侧重于识别和消除由最终用户错误或故意安装的假/rouge接入点,使用信标帧,可以以更快和更便宜的速度从网络中识别和删除此类rouge设备,而无需任何额外的硬件。本文将通过RAPD算法扩展安全性增强。
{"title":"Security Enhancement Scheme in Mobile Wireless Sensor Networks Using RAPD Approach","authors":"Abhijit S. Bodhe, Jagdisha N.","doi":"10.1109/I-SMAC47947.2019.9032647","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032647","url":null,"abstract":"Now a day's social media is trending towards wireless technology for a wire-free and faster communication, especially mobile devices are interconnected together to create a complete network in an organization or even in the home, where the detection and identification of fraud devices play an important role. These devices can be a potential threat to the entire network. The proposed method focuses on identification and eradication of fake/rouge access points which is installed by mistake or intentionally by end user, using beacon frame this can possible to identify and remove such rouge devices from the network in faster and cheaper rate, without any additional hardware's, The paper will surly an extension for security enhancements with RAPD algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on IoT Standards and Suggesting a New Method to Enhance Data Security 物联网标准综述及提高数据安全的新方法
H. Ghorbani, M. Mohammadzadeh
IoT is a new phenomenon that quickly spread and has penetrated unequivocally in all areas, including economics, education, industry, entertainment, and is a very serious competitor with high abilities for other technologies. One of the pillars of the IoT is information and data in its network which includes a large variety. This diversity has been added to the importance of data protection. In the digital world, all the work is done on the basis of data and their value and these data, which play a fundamental role in the success or failure of the work. The determination of data value and data security are very important. In most articles and works in this field, all attention has been given to one dimension of security, and security has never been seen from the general viewpoint. While we need to provide security at different levels for security purposes. In this article, we refer to a method that can be used to create a ring of protection for data. This guard ring must meet the minimum requirements, which includes the five items that we refer to. On the other hand, with increased security for each item, our data security will also increase. By doing this, we can always create a minimum level of security for data.
物联网是一种新现象,在经济、教育、工业、娱乐等各个领域迅速传播和渗透,是其他技术非常强大的竞争对手。物联网的支柱之一是其网络中的信息和数据,其中包括各种各样的信息和数据。这种多样性增加了数据保护的重要性。在数字世界中,所有的工作都是在数据及其价值的基础上完成的,这些数据对工作的成败起着根本性的作用。数据值的确定和数据的安全是非常重要的。在该领域的大多数文章和著作中,所有的注意力都集中在安全的一个维度上,而从来没有从一般的角度来看待安全。而出于安全目的,我们需要提供不同级别的安全性。在本文中,我们将引用一种可用于为数据创建保护环的方法。这个护环必须满足最低要求,包括我们提到的五个项目。另一方面,随着每个项目的安全性提高,我们的数据安全性也会提高。通过这样做,我们总是可以为数据创建最低级别的安全性。
{"title":"Review on IoT Standards and Suggesting a New Method to Enhance Data Security","authors":"H. Ghorbani, M. Mohammadzadeh","doi":"10.1109/I-SMAC47947.2019.9032571","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032571","url":null,"abstract":"IoT is a new phenomenon that quickly spread and has penetrated unequivocally in all areas, including economics, education, industry, entertainment, and is a very serious competitor with high abilities for other technologies. One of the pillars of the IoT is information and data in its network which includes a large variety. This diversity has been added to the importance of data protection. In the digital world, all the work is done on the basis of data and their value and these data, which play a fundamental role in the success or failure of the work. The determination of data value and data security are very important. In most articles and works in this field, all attention has been given to one dimension of security, and security has never been seen from the general viewpoint. While we need to provide security at different levels for security purposes. In this article, we refer to a method that can be used to create a ring of protection for data. This guard ring must meet the minimum requirements, which includes the five items that we refer to. On the other hand, with increased security for each item, our data security will also increase. By doing this, we can always create a minimum level of security for data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1