首页 > 最新文献

2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Design and Comparison of Tumor Segmentation Using an ML-Based Clustering Method 基于ml聚类方法的肿瘤分割设计与比较
V. Samudrala, N. Revathi, S. Padhi, S. Sasireka, B. Selvalakshmi, Divya Francis
A brain tumor is a common syndrome, where a specific set of cells gather and begin to grow inside a human brain, to interfere with the brain s regular function. Though there are a lot of techniques that act as a preliminary test for tumors, an analysis of the MRI scan image is sometimes enough to predict the presence of the tumor. This study aims in finding the best machine learning algorithm that can detect brain tumors with the highest accuracy value. For this purpose, a dataset of images from MRI scans of human brain s is obtained via Kaggle. After that, this dataset is preprocessed using a few techniques. The techniques involve image scaling and color conversion. Two different machine learning models were produced by two different algorithms. The machine learning algorithms used in this work are the U-net and the FPN. The created models are then trained using the preprocessed datasets. The models are then evaluated using a separate set of photos after training. Two metrics, the IoU and dice coefficient, are used to analyze the training and validation results. Although the parameters for both models remain the same during training and validation, it was ultimately determined that the FPN method is more effective at predicting brain cancers. The algorithm’s ultimate IoU value is 0.865, and its dice coefficient is 0.9034. The model is complete because the results were excellent for an image processing model. Real-time photos are used to test the model one more time before it is finished. This analysis’ findings are also deemed to be exceedingly adequate.
脑肿瘤是一种常见的综合症,一组特定的细胞聚集并开始在人脑中生长,从而干扰大脑的正常功能。虽然有很多技术可以作为肿瘤的初步测试,但对MRI扫描图像的分析有时足以预测肿瘤的存在。本研究旨在寻找能够以最高的准确率值检测脑肿瘤的最佳机器学习算法。为此,通过Kaggle获得了人类大脑MRI扫描图像的数据集。之后,使用一些技术对该数据集进行预处理。这些技术包括图像缩放和颜色转换。两种不同的机器学习模型由两种不同的算法产生。这项工作中使用的机器学习算法是U-net和FPN。然后使用预处理的数据集训练创建的模型。然后使用训练后的一组单独的照片对模型进行评估。两个指标,IoU和骰子系数,用于分析训练和验证结果。尽管两种模型的参数在训练和验证过程中保持不变,但最终确定FPN方法在预测脑癌方面更有效。该算法的最终IoU值为0.865,骰子系数为0.9034。该模型是完整的,因为结果是优秀的图像处理模型。在模型完成之前,实时照片用于再次测试模型。这一分析的发现也被认为是非常充分的。
{"title":"Design and Comparison of Tumor Segmentation Using an ML-Based Clustering Method","authors":"V. Samudrala, N. Revathi, S. Padhi, S. Sasireka, B. Selvalakshmi, Divya Francis","doi":"10.1109/I-SMAC55078.2022.9987435","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987435","url":null,"abstract":"A brain tumor is a common syndrome, where a specific set of cells gather and begin to grow inside a human brain, to interfere with the brain s regular function. Though there are a lot of techniques that act as a preliminary test for tumors, an analysis of the MRI scan image is sometimes enough to predict the presence of the tumor. This study aims in finding the best machine learning algorithm that can detect brain tumors with the highest accuracy value. For this purpose, a dataset of images from MRI scans of human brain s is obtained via Kaggle. After that, this dataset is preprocessed using a few techniques. The techniques involve image scaling and color conversion. Two different machine learning models were produced by two different algorithms. The machine learning algorithms used in this work are the U-net and the FPN. The created models are then trained using the preprocessed datasets. The models are then evaluated using a separate set of photos after training. Two metrics, the IoU and dice coefficient, are used to analyze the training and validation results. Although the parameters for both models remain the same during training and validation, it was ultimately determined that the FPN method is more effective at predicting brain cancers. The algorithm’s ultimate IoU value is 0.865, and its dice coefficient is 0.9034. The model is complete because the results were excellent for an image processing model. Real-time photos are used to test the model one more time before it is finished. This analysis’ findings are also deemed to be exceedingly adequate.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121271574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for IoT Intrusion Detection System using Modified Optimizer and Convolutional Neural Network 一种基于改进优化器和卷积神经网络的物联网入侵检测新方法
S. Vijayalakshmi, T. D. Subha, L. Manimegalai, Ektha Sudhakar Reddy, Dama Yaswanth, Sakithya Gopinath
The development of cyber security is very important, and as a result, it has received a significant amount of research interest from academic institutions and industrial groups all over the globe. It is also of the utmost importance to offer computing that is environmentally friendly for the Internet of Things. In order to detect intrusions and identify malicious actors, machine learning algorithms play an essential part in the cyber security of the internet of things (IoT). Because of this, the purpose of this work is to create novel techniques of extracting attributes that take use of the benefits offered by swarm intelligence (SI) method. We devise a technique for the extracting the attributes that is based on the traditional neural networks. In addition, in order to compute the effectiveness of the IDS method that was created, four well recognized public datasets were employed. We also evaluated detailed comparisons to many alternative optimization approaches in order to test the proposed method’s ability to compete successfully in the market. The findings demonstrate that the created strategy performs very well when measured against a variety of assessment metrics.
网络安全的发展非常重要,因此得到了全球学术机构和产业团体的大量研究兴趣。为物联网提供对环境友好的计算也至关重要。为了检测入侵并识别恶意行为者,机器学习算法在物联网(IoT)的网络安全中起着至关重要的作用。正因为如此,这项工作的目的是创造新的提取属性的技术,利用群体智能(SI)方法提供的好处。本文在传统神经网络的基础上,设计了一种属性提取技术。此外,为了计算所创建的IDS方法的有效性,使用了四个公认的公共数据集。我们还评估了与许多备选优化方法的详细比较,以测试所提出的方法在市场上成功竞争的能力。结果表明,当根据各种评估指标进行度量时,所创建的策略执行得非常好。
{"title":"A Novel Approach for IoT Intrusion Detection System using Modified Optimizer and Convolutional Neural Network","authors":"S. Vijayalakshmi, T. D. Subha, L. Manimegalai, Ektha Sudhakar Reddy, Dama Yaswanth, Sakithya Gopinath","doi":"10.1109/I-SMAC55078.2022.9987314","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987314","url":null,"abstract":"The development of cyber security is very important, and as a result, it has received a significant amount of research interest from academic institutions and industrial groups all over the globe. It is also of the utmost importance to offer computing that is environmentally friendly for the Internet of Things. In order to detect intrusions and identify malicious actors, machine learning algorithms play an essential part in the cyber security of the internet of things (IoT). Because of this, the purpose of this work is to create novel techniques of extracting attributes that take use of the benefits offered by swarm intelligence (SI) method. We devise a technique for the extracting the attributes that is based on the traditional neural networks. In addition, in order to compute the effectiveness of the IDS method that was created, four well recognized public datasets were employed. We also evaluated detailed comparisons to many alternative optimization approaches in order to test the proposed method’s ability to compete successfully in the market. The findings demonstrate that the created strategy performs very well when measured against a variety of assessment metrics.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption 利用机器人密钥同态加密实现数据保护分析和数据保护的网络安全
Ankur Biswas, A. Karan, Nidhi Nigam, H. Doreswamy, Serikkhan Sadykanova, Mangazina Zhanel Rauliyevna
Cloud computing plays major role in the development of accessing clouduser’s document and sensitive information stored. It has variety of content and representation. Cyber security and attacks in the cloud is a challenging aspect. Information security attains a vital part in Cyber Security management. It involves actions intended to reduce the adverse impacts of such incidents. To access the documents stored in cloud safely and securely, access control will be introduced based on cloud users to access the user’s document in the cloud. To achieve this, it is highly required to combine security components (e.g., Access Control, Usage Control) in the security document to get automatic information. This research work has proposed a Role Key Homomorphic Encryption Algorithm (RKHEA) to monitor the cloud users, who access the services continuously. This method provides access creation of session-based key to store the singularized encryption to reduce the key size from random methods to occupy memory space. It has some terms and conditions to be followed by the cloud users and also has encryption method to secure the document content. Hence the documents are encrypted with the RKHEA algorithm based on Service Key Access (SKA). Then, the encrypted key will be created based on access control conditions. The proposed analytics result shows an enhanced control over the documents in cloud and improved security performance.
云计算在访问云用户存储的文档和敏感信息方面发挥着重要作用。它有各种各样的内容和表现形式。云中的网络安全和攻击是一个具有挑战性的方面。信息安全是网络安全管理的重要组成部分。它涉及旨在减少这类事件的不利影响的行动。为了安全可靠地访问存储在云中的文档,将引入基于云用户的访问控制,以访问云中的用户文档。为了实现这一点,高度需要在安全文档中组合安全组件(例如,访问控制、使用控制)以获得自动信息。本研究提出了一种角色密钥同态加密算法(RKHEA)来监控持续访问服务的云用户。该方法提供基于会话的密钥访问创建,以存储奇点加密,减少随机方法对密钥大小的占用。它有一些云用户必须遵守的条款和条件,也有加密方法来保护文档内容。因此,使用基于服务密钥访问(SKA)的RKHEA算法对文档进行加密。然后,根据访问控制条件创建加密密钥。建议的分析结果显示了对云中的文档的增强控制和改进的安全性能。
{"title":"Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption","authors":"Ankur Biswas, A. Karan, Nidhi Nigam, H. Doreswamy, Serikkhan Sadykanova, Mangazina Zhanel Rauliyevna","doi":"10.1109/I-SMAC55078.2022.9987407","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987407","url":null,"abstract":"Cloud computing plays major role in the development of accessing clouduser’s document and sensitive information stored. It has variety of content and representation. Cyber security and attacks in the cloud is a challenging aspect. Information security attains a vital part in Cyber Security management. It involves actions intended to reduce the adverse impacts of such incidents. To access the documents stored in cloud safely and securely, access control will be introduced based on cloud users to access the user’s document in the cloud. To achieve this, it is highly required to combine security components (e.g., Access Control, Usage Control) in the security document to get automatic information. This research work has proposed a Role Key Homomorphic Encryption Algorithm (RKHEA) to monitor the cloud users, who access the services continuously. This method provides access creation of session-based key to store the singularized encryption to reduce the key size from random methods to occupy memory space. It has some terms and conditions to be followed by the cloud users and also has encryption method to secure the document content. Hence the documents are encrypted with the RKHEA algorithm based on Service Key Access (SKA). Then, the encrypted key will be created based on access control conditions. The proposed analytics result shows an enhanced control over the documents in cloud and improved security performance.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115261333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Sales Prediction and Characterization using Consumer Perceptions 使用消费者感知的基于机器学习的销售预测和表征
J. Sreemathy, N. Prasath
In today’s age of automated scenarios and digital lifestyle, online shopping has really made its way to everyone’s household, with one touch anyone can order the required products. The use of digital marketing over conventional marketing is often favored. It is beneficial to both social media marketing professionals and technicians. When conducting research, one may gain preliminary insights into consumers’ perceptions of social media advertisements and online buying habits. Online knowledge exchange allows researchers, academics, and business people to swiftly and easily connect with individuals while conducting searchable mobile brand website research. This research provides a methodical description of a study that only aids consumers in making the optimal smartphone decision for their own parametric needs. A given dataset will be examined utilising machine learning methods, such as brand name predictions with regression and precise results. Groups of people are frequently paid by brands to create internet evaluations, which may be favourable to them or unfavourable to their competitors.
在当今自动化场景和数字化生活方式的时代,网上购物已经真正进入了每个家庭,只要轻轻一触,任何人都可以订购所需的产品。数字营销比传统营销更受青睐。这对社会媒体营销专业人员和技术人员都是有益的。在进行研究时,可以初步了解消费者对社交媒体广告的看法和在线购买习惯。在线知识交换允许研究人员、学者和商业人士在进行可搜索的移动品牌网站研究时快速、轻松地与个人建立联系。这项研究提供了一项研究的系统描述,该研究仅帮助消费者根据自己的参数需求做出最佳的智能手机决策。给定的数据集将使用机器学习方法进行检查,例如带有回归和精确结果的品牌名称预测。品牌经常雇佣一些人在网上进行评估,这些评估可能对自己有利,也可能对竞争对手不利。
{"title":"Machine Learning based Sales Prediction and Characterization using Consumer Perceptions","authors":"J. Sreemathy, N. Prasath","doi":"10.1109/I-SMAC55078.2022.9987359","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987359","url":null,"abstract":"In today’s age of automated scenarios and digital lifestyle, online shopping has really made its way to everyone’s household, with one touch anyone can order the required products. The use of digital marketing over conventional marketing is often favored. It is beneficial to both social media marketing professionals and technicians. When conducting research, one may gain preliminary insights into consumers’ perceptions of social media advertisements and online buying habits. Online knowledge exchange allows researchers, academics, and business people to swiftly and easily connect with individuals while conducting searchable mobile brand website research. This research provides a methodical description of a study that only aids consumers in making the optimal smartphone decision for their own parametric needs. A given dataset will be examined utilising machine learning methods, such as brand name predictions with regression and precise results. Groups of people are frequently paid by brands to create internet evaluations, which may be favourable to them or unfavourable to their competitors.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Women Safety and Alertness in Instagram using Deep Learning 在Instagram上使用深度学习的女性安全和警觉性
S. Nissi, K. G. Saravanan, C. Srivenkateswaran, Nishathini, D.C. JullieJosephine, S. Shibia Malar
This research investigates the social media concern about social judgement. Therefore, immediate utilization to enhance women safety. Unique references are widely distributed in social networking sites and apps like Facebook, Twitter, and Instagram. Instagram typically offers opportunities in a range of fields by using images and videos to educate users. Instagram manages the hash tag messages that are extensively viewed and serves as a forum for women to express their emotions and thoughts. The quotes focusing on the protection of women may be used to read a message from the youth culture and therefore strict measures can be initialized to outlaw the messaging priority using deep learning and actions can be taken against those who abuse women. Instagram and other Instagram handles that post messages with hash tags are useful to establish a global communication. This research study utilized deep learning model to investigate the security and privacy of women social media users.
本研究调查了社交媒体对社会判断的关注。因此,立即利用,提高妇女安全。独特的引用广泛分布在社交网站和应用程序中,如Facebook、Twitter和Instagram。Instagram通常通过使用图片和视频来教育用户,提供一系列领域的机会。Instagram管理着被广泛浏览的标签信息,并作为女性表达情感和想法的论坛。关注保护妇女的引言可以用来解读来自青年文化的信息,因此可以初始化严格的措施,使用深度学习来取缔信息优先级,并可以对那些虐待妇女的人采取行动。Instagram和其他发布带有散列标签的消息的Instagram处理程序对于建立全球通信很有用。本研究利用深度学习模型对女性社交媒体用户的安全和隐私进行了调查。
{"title":"Women Safety and Alertness in Instagram using Deep Learning","authors":"S. Nissi, K. G. Saravanan, C. Srivenkateswaran, Nishathini, D.C. JullieJosephine, S. Shibia Malar","doi":"10.1109/I-SMAC55078.2022.9986500","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9986500","url":null,"abstract":"This research investigates the social media concern about social judgement. Therefore, immediate utilization to enhance women safety. Unique references are widely distributed in social networking sites and apps like Facebook, Twitter, and Instagram. Instagram typically offers opportunities in a range of fields by using images and videos to educate users. Instagram manages the hash tag messages that are extensively viewed and serves as a forum for women to express their emotions and thoughts. The quotes focusing on the protection of women may be used to read a message from the youth culture and therefore strict measures can be initialized to outlaw the messaging priority using deep learning and actions can be taken against those who abuse women. Instagram and other Instagram handles that post messages with hash tags are useful to establish a global communication. This research study utilized deep learning model to investigate the security and privacy of women social media users.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114179568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishment of Soil Preferential Flow Model based on Modern Remote Sensor Observation Methods 基于现代遥感观测方法的土壤优先流模型的建立
Yan Liu
Establishment of the soil preferential flow model based on modern remote sensor observation methods is studied in this study. It is currently the world’s advanced open solution for the process automation systems and a new generation of open system for the industry. Hence, this paper proposes the 2 aspects of novelty. (1) Small satellites can use various forms of the delivery and launch vehicles, and it only takes a few days from preparation to launch and even activation. This technology will be applied in the data collection process. (2) The function of the sink node is responsible for the convergence and forwarding of information in the WSN. This novel sensor model is used to perform information transmission. Besides these, the soil preferential flow model is designed and implemented. The simulation is conducted for the verification of the proposed framework.
本文研究了基于现代遥感观测方法的土壤优先流模型的建立。它是目前世界上先进的过程自动化系统开放解决方案,是行业新一代开放系统。因此,本文提出了新颖性的两个方面。(1)小卫星可以使用多种形式的运载火箭和运载火箭,从准备发射到激活只需几天时间。该技术将应用于数据采集过程中。(2)汇聚节点的功能是负责WSN中信息的汇聚和转发。利用该传感器模型进行信息传输。在此基础上,设计并实现了土壤优先流模型。通过仿真验证了所提框架的有效性。
{"title":"Establishment of Soil Preferential Flow Model based on Modern Remote Sensor Observation Methods","authors":"Yan Liu","doi":"10.1109/I-SMAC55078.2022.9987286","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987286","url":null,"abstract":"Establishment of the soil preferential flow model based on modern remote sensor observation methods is studied in this study. It is currently the world’s advanced open solution for the process automation systems and a new generation of open system for the industry. Hence, this paper proposes the 2 aspects of novelty. (1) Small satellites can use various forms of the delivery and launch vehicles, and it only takes a few days from preparation to launch and even activation. This technology will be applied in the data collection process. (2) The function of the sink node is responsible for the convergence and forwarding of information in the WSN. This novel sensor model is used to perform information transmission. Besides these, the soil preferential flow model is designed and implemented. The simulation is conducted for the verification of the proposed framework.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Intelligent Real time Monitoring System based on Neural Network Optimization 基于神经网络优化的智能实时监控系统研究
Changhui Wang
A mathematical model composed of artificial intelligence neural network (BP) and genetic algorithm (GA) is proposed. Taking advantage of the neural network, the genetic algorithm overcomes the defect that the neural network is easy to fall into the local minimum error. Combining the soft measurement technology of DO concentration with the computer automatic control technology, the intelligent monitoring scheme of the sewage treatment process is designed, the overall structure and function of the system are given, the fuzzy system is applied to the particle swarm optimization algorithm, and the dynamic adjustment inertia is established. Fuzzy rules for weights. Simulation research by optimizing the extreme point of the test function.
提出了一种由人工智能神经网络(BP)和遗传算法(GA)组成的数学模型。遗传算法利用神经网络的优点,克服了神经网络容易陷入局部最小误差的缺陷。将DO浓度软测量技术与计算机自动控制技术相结合,设计了污水处理过程的智能监控方案,给出了系统的总体结构和功能,将模糊系统应用于粒子群优化算法,建立了动态调整惯性。权重的模糊规则。通过优化测试函数极值点进行仿真研究。
{"title":"Research on Intelligent Real time Monitoring System based on Neural Network Optimization","authors":"Changhui Wang","doi":"10.1109/I-SMAC55078.2022.9987336","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987336","url":null,"abstract":"A mathematical model composed of artificial intelligence neural network (BP) and genetic algorithm (GA) is proposed. Taking advantage of the neural network, the genetic algorithm overcomes the defect that the neural network is easy to fall into the local minimum error. Combining the soft measurement technology of DO concentration with the computer automatic control technology, the intelligent monitoring scheme of the sewage treatment process is designed, the overall structure and function of the system are given, the fuzzy system is applied to the particle swarm optimization algorithm, and the dynamic adjustment inertia is established. Fuzzy rules for weights. Simulation research by optimizing the extreme point of the test function.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128544803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Feature Extraction and Waveform Matching from the Perspective of Multi-Dimensional Information Integration Algorithm 多维信息集成算法视角下的特征提取与波形匹配分析
Hong Zhang
Chinese classical music has the value of conserving its temperament in the excellent traditional Chinese culture education of college students, making it the value of the times as the inheritor of Chinese cultural emotional experience. The 20dimensional features are obtained by dimensionality reduction optimization, and then the detail coefficients from the first scale to the fourth scale and the approximation coefficients of the fourth scale are extracted as frequency domain features through discrete wavelet transform, which has the power to gather young people to “go up” and “to be kind”. We set, using MDI algorithm and conventional linear fitting and exponential fitting algorithms to obtain the corresponding quantitative map of T2 mental characteristics and calculate and display the noise propagation characteristics of the three algorithms by Monte Carlo method is essential and selected as the core of the proposed model.
中国古典音乐作为中国文化情感体验的传承者,在大学生优秀传统文化教育中具有保存其气质的价值,使其具有时代价值。通过降维优化得到20维特征,然后通过离散小波变换提取第1到第4尺度的细节系数和第4尺度的近似系数作为频域特征,具有凝聚年轻人“向上”、“向善”的力量。我们设置,使用MDI算法和传统的线性拟合和指数拟合算法获得相应的T2心理特征定量图,并计算和显示噪声传播特性,这三种算法的蒙特卡罗方法是必不可少的,并选择作为所提出模型的核心。
{"title":"Analysis of Feature Extraction and Waveform Matching from the Perspective of Multi-Dimensional Information Integration Algorithm","authors":"Hong Zhang","doi":"10.1109/I-SMAC55078.2022.9987295","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987295","url":null,"abstract":"Chinese classical music has the value of conserving its temperament in the excellent traditional Chinese culture education of college students, making it the value of the times as the inheritor of Chinese cultural emotional experience. The 20dimensional features are obtained by dimensionality reduction optimization, and then the detail coefficients from the first scale to the fourth scale and the approximation coefficients of the fourth scale are extracted as frequency domain features through discrete wavelet transform, which has the power to gather young people to “go up” and “to be kind”. We set, using MDI algorithm and conventional linear fitting and exponential fitting algorithms to obtain the corresponding quantitative map of T2 mental characteristics and calculate and display the noise propagation characteristics of the three algorithms by Monte Carlo method is essential and selected as the core of the proposed model.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129458619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling a Risk-based Network Model for Epileptic Seizure Prediction using Learning Approaches 利用学习方法建立基于风险的癫痫发作预测网络模型
Anandaraj A, P. Alphonse
The process of developing across space and time in the networks of a person with epilepsy occurs through Epileptic seizures. The generalizable technique is developed in this research to predict a particular patient seizure using the evaluation of featurerepresentation to obtain the features from the signals of multichannel EEG. The features are revealed for the signals of EEG using the available parameters. The features are input to the Risk-based Elman learning model (r - ELM) to evaluate feature representation to collectively train the data. The suggested model of r-ELM obtains 0. 096/h as the rate of false prediction, 85% as sensitivity, and 10% as the time in warning to perform the tests from the EEG dataset of CHB-Mn scalp using 10 patients. The suggested method has superiority over the existing results. Various metrics are used in the experiment which shows the epileptic stage as the essential factor affecting seizures’ performance. A subject-oriented method for seizure prediction is presented in the proposed system, which is powerful for the unbalanced data and created for any dataset of scalp EEG with no requirement of subject-oriented engineering.
在癫痫患者的网络中,跨越空间和时间的发展过程通过癫痫发作发生。本研究提出了一种基于特征表征的多通道脑电图特征预测技术,用于预测特定患者的癫痫发作。利用可用的参数揭示脑电信号的特征。这些特征被输入到基于风险的Elman学习模型(r - ELM)中,以评估特征表示,从而对数据进行集体训练。建议的r-ELM模型得到0。对10例CHB-Mn头皮脑电图数据集进行测试,错误预测率为096/h,灵敏度为85%,预警时间为10%。所提出的方法比已有的结果具有优越性。实验中使用了各种指标,表明癫痫发作阶段是影响癫痫发作表现的重要因素。提出了一种面向对象的癫痫发作预测方法,该方法对不平衡数据具有强大的预测能力,可用于任何头皮脑电数据集,不需要面向对象的工程。
{"title":"Modelling a Risk-based Network Model for Epileptic Seizure Prediction using Learning Approaches","authors":"Anandaraj A, P. Alphonse","doi":"10.1109/I-SMAC55078.2022.9987399","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987399","url":null,"abstract":"The process of developing across space and time in the networks of a person with epilepsy occurs through Epileptic seizures. The generalizable technique is developed in this research to predict a particular patient seizure using the evaluation of featurerepresentation to obtain the features from the signals of multichannel EEG. The features are revealed for the signals of EEG using the available parameters. The features are input to the Risk-based Elman learning model (r - ELM) to evaluate feature representation to collectively train the data. The suggested model of r-ELM obtains 0. 096/h as the rate of false prediction, 85% as sensitivity, and 10% as the time in warning to perform the tests from the EEG dataset of CHB-Mn scalp using 10 patients. The suggested method has superiority over the existing results. Various metrics are used in the experiment which shows the epileptic stage as the essential factor affecting seizures’ performance. A subject-oriented method for seizure prediction is presented in the proposed system, which is powerful for the unbalanced data and created for any dataset of scalp EEG with no requirement of subject-oriented engineering.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Center Backup Framework based on Audio and Video Complex Information Extraction Algorithm 基于音视频复杂信息提取算法的多中心备份框架
Han Wu
This paper first introduces the principle, development and application of expert system, and proposes a robust agricultural science and education video text extraction method based on complex background. The algorithm mainly realizes video text extraction through video decoding, MSER text positioning, projection segmentation and Tesseract text recognition. An English-assisted teaching module based on expert system theory, which is aimed at teachers and users. The module classifies and summarizes English knowledge points using a combination of frame-based and production-based knowledge expressions. BP neural network is used to establish students’ autonomous learning and the system module analyzes the test situation of the students, enables the students to self-diagnose, and combines the memory forgetting curve through the students’ repeated practice.
本文首先介绍了专家系统的原理、发展和应用,提出了一种基于复杂背景的鲁棒农业科教视频文本提取方法。该算法主要通过视频解码、MSER文本定位、投影分割和Tesseract文本识别实现视频文本提取。基于专家系统理论的英语辅助教学模块,主要面向教师和用户。该模块结合基于框架和基于生产的知识表达对英语知识点进行分类和总结。利用BP神经网络建立学生的自主学习,系统模块分析学生的测试情况,使学生能够自我诊断,并通过学生的反复练习结合记忆遗忘曲线。
{"title":"Multi-Center Backup Framework based on Audio and Video Complex Information Extraction Algorithm","authors":"Han Wu","doi":"10.1109/I-SMAC55078.2022.9987347","DOIUrl":"https://doi.org/10.1109/I-SMAC55078.2022.9987347","url":null,"abstract":"This paper first introduces the principle, development and application of expert system, and proposes a robust agricultural science and education video text extraction method based on complex background. The algorithm mainly realizes video text extraction through video decoding, MSER text positioning, projection segmentation and Tesseract text recognition. An English-assisted teaching module based on expert system theory, which is aimed at teachers and users. The module classifies and summarizes English knowledge points using a combination of frame-based and production-based knowledge expressions. BP neural network is used to establish students’ autonomous learning and the system module analyzes the test situation of the students, enables the students to self-diagnose, and combines the memory forgetting curve through the students’ repeated practice.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127004696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1