首页 > 最新文献

2022 6th International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Traffic Flow Forecast using Time Series Analysis based on Machine Learning 基于机器学习的时间序列分析交通流量预测
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753812
B. R. Krishna, M. H. Reddy, P. Vaishnavi, S. Reddy
Intelligent Transportation System’s (ITS) main aim is to provide advanced services in both the transportation and traffic fields. A wide variety of algorithms and different types of models are being used for the estimation of short-term traffic flow. These algorithms works based on time series prediction and machine learning techniques for achieving improved results. Most of these models, on the other hand, require the historical data as continuous input, thus making it difficult to automatically find the best time delays. Our proposed study recommends a model "Long Short-Term Memory Recurrent Neural Network (LSTM RNN)" that employs the memory block's based on three multiplicative units to dynamically select the best time delays. The Performance Measurement System (PeMS) dataset is used for building this model that is then compared to other models like Random Walk (RW) and Support Vector Machine (SVM), one layer Feed Forward Neural Network (FFNN) and Stacking Auto Encoder (SAE). Based on the results it is observed that the proposed model gives better predictions than the other models and the same is measured in terms of accuracy.
智能交通系统(ITS)的主要目标是在运输和交通领域提供先进的服务。各种各样的算法和不同类型的模型被用于估计短期交通流量。这些算法基于时间序列预测和机器学习技术来实现改进的结果。另一方面,这些模型大多需要历史数据作为连续输入,因此很难自动找到最佳的时间延迟。我们提出了一种“长短期记忆递归神经网络(LSTM RNN)”模型,该模型采用基于三个乘法单元的记忆块来动态选择最佳时滞。性能测量系统(PeMS)数据集用于构建该模型,然后将其与随机漫步(RW)和支持向量机(SVM)、单层前馈神经网络(FFNN)和堆叠自动编码器(SAE)等其他模型进行比较。结果表明,本文提出的模型比其他模型具有更好的预测精度。
{"title":"Traffic Flow Forecast using Time Series Analysis based on Machine Learning","authors":"B. R. Krishna, M. H. Reddy, P. Vaishnavi, S. Reddy","doi":"10.1109/ICCMC53470.2022.9753812","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753812","url":null,"abstract":"Intelligent Transportation System’s (ITS) main aim is to provide advanced services in both the transportation and traffic fields. A wide variety of algorithms and different types of models are being used for the estimation of short-term traffic flow. These algorithms works based on time series prediction and machine learning techniques for achieving improved results. Most of these models, on the other hand, require the historical data as continuous input, thus making it difficult to automatically find the best time delays. Our proposed study recommends a model \"Long Short-Term Memory Recurrent Neural Network (LSTM RNN)\" that employs the memory block's based on three multiplicative units to dynamically select the best time delays. The Performance Measurement System (PeMS) dataset is used for building this model that is then compared to other models like Random Walk (RW) and Support Vector Machine (SVM), one layer Feed Forward Neural Network (FFNN) and Stacking Auto Encoder (SAE). Based on the results it is observed that the proposed model gives better predictions than the other models and the same is measured in terms of accuracy.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131172220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Penetration Testing of Wireless EncryptionProtocols 无线加密协议的渗透测试
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9754042
Sandesh Jain, Sarthak Pruthi, Vivek Yadav, K. Sharma
Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to sniff and seize data packets. The goal of this work is to use penetration testing to identify weaknesses in the WEP, WPA, and 802.11i WPA2 security protocols, as well as to conduct attacks against them being anonymous with the use of macchanger script. Kali Linux and its Aircrack-ng tools were used to perform penetration testing in WEP & exploited a 4-way handshake for WPA/WPA2.
由于其灵活性、可移植性和简单的可访问性,无线网络作为通信媒介的使用急剧增加。随着越来越多的设备加入无线网络,有价值和敏感的数据在用户之间通过空中传输,这使得攻击者很容易嗅探和获取数据包。这项工作的目标是使用渗透测试来识别WEP, WPA和802.11i WPA2安全协议中的弱点,以及使用macchanger脚本对它们进行匿名攻击。Kali Linux及其Aircrack-ng工具被用来对WEP进行渗透测试,并利用了WPA/WPA2的4路握手。
{"title":"Penetration Testing of Wireless EncryptionProtocols","authors":"Sandesh Jain, Sarthak Pruthi, Vivek Yadav, K. Sharma","doi":"10.1109/ICCMC53470.2022.9754042","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754042","url":null,"abstract":"Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to sniff and seize data packets. The goal of this work is to use penetration testing to identify weaknesses in the WEP, WPA, and 802.11i WPA2 security protocols, as well as to conduct attacks against them being anonymous with the use of macchanger script. Kali Linux and its Aircrack-ng tools were used to perform penetration testing in WEP & exploited a 4-way handshake for WPA/WPA2.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Sports Competition Information Issuing System Based on Fuzzy Website Generation System 基于模糊网站生成系统的体育竞赛信息发布系统设计
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753936
Yingda Li
Aiming at the problems of inconsistency of format, incompatibility of information release software, duplication of development work and other issues in the information release of various competitions, this paper designs and develops a general information release system for sports competitions. Through the fuzzy website generation system, the individual competitions can be completed. Design of information release system. The software design of the system is based on the BS architecture, and a large number of grouping rule tables are built-in for regular games, which can give the best grouping in most cases. The dynamic expression analysis function in the scoring algorithm basically covers all numerical calculation scoring competition systems.
本文针对各类赛事信息发布中存在的格式不一致、信息发布软件不兼容、开发工作重复等问题,设计开发了一个通用的体育赛事信息发布系统。通过模糊网站生成系统,完成个人比赛。信息发布系统的设计。系统的软件设计基于BS架构,内置了大量的常规比赛分组规则表,在大多数情况下都能给出最佳分组。计分算法中的动态表达式分析功能基本涵盖了所有数值计算计分竞赛系统。
{"title":"Design of Sports Competition Information Issuing System Based on Fuzzy Website Generation System","authors":"Yingda Li","doi":"10.1109/ICCMC53470.2022.9753936","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753936","url":null,"abstract":"Aiming at the problems of inconsistency of format, incompatibility of information release software, duplication of development work and other issues in the information release of various competitions, this paper designs and develops a general information release system for sports competitions. Through the fuzzy website generation system, the individual competitions can be completed. Design of information release system. The software design of the system is based on the BS architecture, and a large number of grouping rule tables are built-in for regular games, which can give the best grouping in most cases. The dynamic expression analysis function in the scoring algorithm basically covers all numerical calculation scoring competition systems.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133036758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applications of Machine Learning in Rheumatoid Arthritis - An Insight 机器学习在类风湿关节炎中的应用
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753705
Ganeshbabu K, I. M.
This paper deals with the review of different data mining and machine learning approaches engaged for the study of Rheumatoid Arthritis (RA). RA is a constant illness that affects the joints located in the fingers, knees, and feet. It is a kind of chronic inflammatory disease that causes severe sickness. In the era of machine learning applications, they lead to some technological as well as clinical advancement for the arthritis diagnosis, prediction, and prognosis of auto immune rheumatoid arthritis. This study provides some vital analysis of the machine learning techniques that are presently practiced in the analysis of medical data for RA and how it is used in the drug development, target identification drug repurposing and delivery.
本文综述了用于类风湿关节炎(RA)研究的不同数据挖掘和机器学习方法。类风湿性关节炎是一种常见病,影响手指、膝盖和脚的关节。它是一种引起严重疾病的慢性炎症性疾病。在机器学习应用的时代,它们为自身免疫性类风湿关节炎的诊断、预测和预后带来了一些技术和临床上的进步。本研究对机器学习技术提供了一些重要的分析,这些技术目前在RA的医疗数据分析中得到实践,以及它如何用于药物开发、目标识别、药物再利用和输送。
{"title":"Applications of Machine Learning in Rheumatoid Arthritis - An Insight","authors":"Ganeshbabu K, I. M.","doi":"10.1109/ICCMC53470.2022.9753705","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753705","url":null,"abstract":"This paper deals with the review of different data mining and machine learning approaches engaged for the study of Rheumatoid Arthritis (RA). RA is a constant illness that affects the joints located in the fingers, knees, and feet. It is a kind of chronic inflammatory disease that causes severe sickness. In the era of machine learning applications, they lead to some technological as well as clinical advancement for the arthritis diagnosis, prediction, and prognosis of auto immune rheumatoid arthritis. This study provides some vital analysis of the machine learning techniques that are presently practiced in the analysis of medical data for RA and how it is used in the drug development, target identification drug repurposing and delivery.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prevention of Fake Food and Adulteration using Electronic Product Code (EPC) and Machine Learning based Block Chain Technology 使用电子产品代码(EPC)和基于机器学习的区块链技术预防假冒食品和掺假
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753910
Narayanan. A. E, Arivunila. M, S. A, A. P
Block chain is a widely dispersed huge technology in which transactions are recorded and preserved, compromising them with the built-in cryptographic generation. Recent studies have focused on the critical principle of Block chain and how it may be used in areas such as data protection change, food safety, product growth, and business acceleration in all retail establishments. The approach includes genuine features in security architecture to prevent low levels and counterfeit medications. Even at the level of individual stocks, Block chain will ensure compliance with the acquisition of any goods by improving evidence of ownership through the use of particular sources. The strategy includes genuine variables inside the security systems to prevent low-tier and counterfeit pharmaceuticals. Even at the level of individual stocks, Block chain will ensure compliance with the acquisition of any goods by strengthening evidence of ownership via the use of unique sources. Because every time a product changes hands, transactions can be recorded and verified using a unique ID known as the EPC code, which is issued remotely using FSSAI, from its production to sales, and is clearly called Block chain. it does not change, it provides consistency and meaning. When the block is finished, generate a fully unique code that binds to the next page or inhibits the appearance of a series of blocks. Because the concept is entirely based on a reliable cryptographic hash algorithm, the transaction cannot be copied or encrypted, copies are equivalent, and minimal authorization is required to gain access to the data. This will significantly eliminate human errors, additional expenses, and time delays and might be a global procurement application. The suggested system uses the K- Nearest Neighbour algorithm to monitor food production from farmers through distributors, who then sell it to customers. Expired stock can be reclaimed and redistributed after special authorization by bodies. Notify customers regarding product performance as well. FSSAI provides the EPC code, which may be found in every product from manufacture to wholesaler to retailer. The code contains all the information about the goods, so when the customer types the code into the programme, all information about that specific product can be obtained.
区块链是一种广泛分散的大型技术,其中交易被记录和保存,并与内置的加密生成相妥协。最近的研究主要集中在区块链的关键原则,以及如何在所有零售机构的数据保护变化、食品安全、产品增长和业务加速等领域使用区块链。该方法包括安全架构中的真实功能,以防止低水平和假药。即使在个人库存层面,区块链也将通过使用特定来源来改善所有权证据,从而确保任何商品的收购符合规定。该战略包括在安全系统内设置真正的变量,以防止低级和假冒药品。即使在个人库存的层面上,区块链也将通过使用独特的来源来加强所有权的证据,从而确保任何商品的收购符合规定。因为每次产品易手时,交易都可以使用称为EPC代码的唯一ID进行记录和验证,该代码由FSSAI远程发布,从生产到销售,显然被称为区块链。它不会改变,它提供了一致性和意义。当块完成时,生成一个完全唯一的代码,该代码绑定到下一页或抑制一系列块的出现。由于该概念完全基于可靠的加密散列算法,因此不能复制或加密事务,副本是等效的,并且需要最少的授权才能访问数据。这将极大地消除人为错误、额外费用和时间延迟,并可能成为全球采购应用程序。该系统使用K近邻算法来监控从农民到经销商的食品生产,然后经销商将其出售给客户。过期库存经机构特别授权后,可回收和重新分配。通知客户有关产品性能。FSSAI提供EPC代码,该代码可以在从制造商到批发商到零售商的每个产品中找到。代码包含有关商品的所有信息,因此当客户在程序中输入代码时,就可以获得有关该特定产品的所有信息。
{"title":"Prevention of Fake Food and Adulteration using Electronic Product Code (EPC) and Machine Learning based Block Chain Technology","authors":"Narayanan. A. E, Arivunila. M, S. A, A. P","doi":"10.1109/ICCMC53470.2022.9753910","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753910","url":null,"abstract":"Block chain is a widely dispersed huge technology in which transactions are recorded and preserved, compromising them with the built-in cryptographic generation. Recent studies have focused on the critical principle of Block chain and how it may be used in areas such as data protection change, food safety, product growth, and business acceleration in all retail establishments. The approach includes genuine features in security architecture to prevent low levels and counterfeit medications. Even at the level of individual stocks, Block chain will ensure compliance with the acquisition of any goods by improving evidence of ownership through the use of particular sources. The strategy includes genuine variables inside the security systems to prevent low-tier and counterfeit pharmaceuticals. Even at the level of individual stocks, Block chain will ensure compliance with the acquisition of any goods by strengthening evidence of ownership via the use of unique sources. Because every time a product changes hands, transactions can be recorded and verified using a unique ID known as the EPC code, which is issued remotely using FSSAI, from its production to sales, and is clearly called Block chain. it does not change, it provides consistency and meaning. When the block is finished, generate a fully unique code that binds to the next page or inhibits the appearance of a series of blocks. Because the concept is entirely based on a reliable cryptographic hash algorithm, the transaction cannot be copied or encrypted, copies are equivalent, and minimal authorization is required to gain access to the data. This will significantly eliminate human errors, additional expenses, and time delays and might be a global procurement application. The suggested system uses the K- Nearest Neighbour algorithm to monitor food production from farmers through distributors, who then sell it to customers. Expired stock can be reclaimed and redistributed after special authorization by bodies. Notify customers regarding product performance as well. FSSAI provides the EPC code, which may be found in every product from manufacture to wholesaler to retailer. The code contains all the information about the goods, so when the customer types the code into the programme, all information about that specific product can be obtained.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Voice Controlled Web based E-Commerce 基于语音控制的Web电子商务的开发
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753691
Md. Taufiq Al Hasib Sadi, Md. Ishtiaq Kadir, Md. Shiblee Rahman, Mohammad Monirujjaman Khan
People's lives have changed as computers and their voice control systems have advanced. The voice recognition system helps users to be hands free and supplies the user with exact responses. It became possible because of many years of research on machine learning and voice control systems. The efficiency and other benefits are the many years of research which also helps to develop person-to-person and human-to-machine interconnections in many ways. Visual disabled users are unable to explore the whole service of these great advanced applications. A voice control system can make various web applications easier for common users. The user can get the details of their products easily by using the voice service. However, the primary goal of developing a voice control system is to assist people with autism, deafness, blindness, and other disabilities who are unable to use their hands. As a result, this voice control technology is created to help them overcome their obstacles. This paper presents a voice control e-commerce application. Demonstrating the usefulness of the SRS taxonomy and gifting a speech-oriented ordered goods purchase online business functionality utilizing IBM's STT has been proposed. This voice control tool will make people's lives easier by allowing them to use it in a range of circumstances, such as text content and government applications. It can also be utilized on any web platform.
随着计算机及其语音控制系统的进步,人们的生活发生了变化。语音识别系统帮助用户摆脱双手,并为用户提供准确的响应。由于多年来对机器学习和语音控制系统的研究,它成为可能。效率和其他好处是多年的研究,也有助于在许多方面发展人与人之间和人机之间的互连。视障用户无法探索这些伟大的先进应用程序的全部服务。语音控制系统可以让普通用户更容易使用各种web应用程序。用户可以通过语音服务轻松获取产品的详细信息。然而,开发语音控制系统的主要目标是帮助患有自闭症、耳聋、失明和其他无法使用双手的残疾人。因此,这种语音控制技术是为了帮助他们克服障碍而创造的。本文提出了一个语音控制在电子商务中的应用。有人提议展示SRS分类法的有用性,并利用IBM的STT提供面向语音的订购商品购买在线业务功能。这种语音控制工具允许人们在各种情况下使用,如文本内容和政府应用程序,将使人们的生活更轻松。它也可以在任何web平台上使用。
{"title":"Development of a Voice Controlled Web based E-Commerce","authors":"Md. Taufiq Al Hasib Sadi, Md. Ishtiaq Kadir, Md. Shiblee Rahman, Mohammad Monirujjaman Khan","doi":"10.1109/ICCMC53470.2022.9753691","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753691","url":null,"abstract":"People's lives have changed as computers and their voice control systems have advanced. The voice recognition system helps users to be hands free and supplies the user with exact responses. It became possible because of many years of research on machine learning and voice control systems. The efficiency and other benefits are the many years of research which also helps to develop person-to-person and human-to-machine interconnections in many ways. Visual disabled users are unable to explore the whole service of these great advanced applications. A voice control system can make various web applications easier for common users. The user can get the details of their products easily by using the voice service. However, the primary goal of developing a voice control system is to assist people with autism, deafness, blindness, and other disabilities who are unable to use their hands. As a result, this voice control technology is created to help them overcome their obstacles. This paper presents a voice control e-commerce application. Demonstrating the usefulness of the SRS taxonomy and gifting a speech-oriented ordered goods purchase online business functionality utilizing IBM's STT has been proposed. This voice control tool will make people's lives easier by allowing them to use it in a range of circumstances, such as text content and government applications. It can also be utilized on any web platform.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Probability Optimization Model in Advanced Mathematics in Data Mining 高等数学概率优化模型在数据挖掘中的应用
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753752
Aijun Zheng
With the continuous deepening of education informatization, the advanced mathematics auxiliary teaching system has been gradually put into use, but from the perspective of the existing advanced mathematics auxiliary teaching system functions, the significance and function of the application of over-analysis probability thought in advanced mathematics will be further analyzed. Probabilistic thinking methods to solve problems. Based on this, this article first explains the importance of designing advanced mathematics data mining system based on probability optimization model, and proposes the design process of advanced mathematics auxiliary teaching system based on data mining from different directions.
随着教育信息化的不断深入,高等数学辅助教学系统已逐步投入使用,但从现有高等数学辅助教学系统功能的角度出发,进一步分析过度分析概率思想在高等数学中应用的意义和作用。用概率思维方法解决问题。基于此,本文首先阐述了基于概率优化模型设计高等数学数据挖掘系统的重要性,并从不同的方向提出了基于数据挖掘的高等数学辅助教学系统的设计过程。
{"title":"Application of Probability Optimization Model in Advanced Mathematics in Data Mining","authors":"Aijun Zheng","doi":"10.1109/ICCMC53470.2022.9753752","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753752","url":null,"abstract":"With the continuous deepening of education informatization, the advanced mathematics auxiliary teaching system has been gradually put into use, but from the perspective of the existing advanced mathematics auxiliary teaching system functions, the significance and function of the application of over-analysis probability thought in advanced mathematics will be further analyzed. Probabilistic thinking methods to solve problems. Based on this, this article first explains the importance of designing advanced mathematics data mining system based on probability optimization model, and proposes the design process of advanced mathematics auxiliary teaching system based on data mining from different directions.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Deep Neural Learning Classifier for Brain Tumor Detection 一种用于脑肿瘤检测的改进深度神经学习分类器
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9754022
S. Kurian, S. Juliet
Magnetic Resonance Imaging (MRI) is a scanning method which captures the anatomy and processes of human body. MRI images are significant for premature recognition of brain cancer. Thus, predicting the brain cancer disease from an MRI scan is not an easy process, because of its complexity and tumor variance. In order to address these problems, Guassian Preprocessed Projection Pursuit Regressive Mathieu Feature Extraction based Deep Neural Learning (GPPPRMFE-DNL) is introduced. GPPPRMFE-DNL Model is proposed for accurate brain tumor detection process in a short time. Gaussian smoothing filter is employed in GPPPRMFE-DNL Model to eradicate the noisy pixels from input image. Subsequently, skull stripping procedure is used for collecting brain tissue from neighbouring region. Then, the image achieved is used for dividing within the segments, to minimize the dimension of input image. Feature extraction is performed to extract the color, texture, and intensity features from the segmented region. Finally, the classification task is performed with the help of logistic activation function between the testing and training image with higher accuracy and lesser error rate. At last, the outcome is determined by an output layer. The observed results show a better analysis of GPPPRMFE-DNL, compared with the two conventional methods.
磁共振成像(MRI)是一种捕捉人体解剖结构和过程的扫描方法。MRI图像对脑癌的早期识别具有重要意义。因此,由于MRI扫描的复杂性和肿瘤的多样性,预测脑癌疾病并不是一个容易的过程。为了解决这些问题,提出了基于高斯预处理投影寻踪回归马修特征提取的深度神经学习(GPPPRMFE-DNL)。提出了GPPPRMFE-DNL模型,用于在短时间内准确检测脑肿瘤。GPPPRMFE-DNL模型采用高斯平滑滤波去除输入图像中的噪声像素。随后,颅骨剥离程序用于收集邻近区域的脑组织。然后,利用得到的图像进行分割,使输入图像的尺寸最小。进行特征提取,从分割的区域中提取颜色、纹理和强度特征。最后,利用测试图像与训练图像之间的逻辑激活函数进行分类任务,准确率更高,错误率更低。最后,由输出层决定输出结果。结果表明,与两种常规方法相比,GPPPRMFE-DNL的分析效果更好。
{"title":"An Improved Deep Neural Learning Classifier for Brain Tumor Detection","authors":"S. Kurian, S. Juliet","doi":"10.1109/ICCMC53470.2022.9754022","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754022","url":null,"abstract":"Magnetic Resonance Imaging (MRI) is a scanning method which captures the anatomy and processes of human body. MRI images are significant for premature recognition of brain cancer. Thus, predicting the brain cancer disease from an MRI scan is not an easy process, because of its complexity and tumor variance. In order to address these problems, Guassian Preprocessed Projection Pursuit Regressive Mathieu Feature Extraction based Deep Neural Learning (GPPPRMFE-DNL) is introduced. GPPPRMFE-DNL Model is proposed for accurate brain tumor detection process in a short time. Gaussian smoothing filter is employed in GPPPRMFE-DNL Model to eradicate the noisy pixels from input image. Subsequently, skull stripping procedure is used for collecting brain tissue from neighbouring region. Then, the image achieved is used for dividing within the segments, to minimize the dimension of input image. Feature extraction is performed to extract the color, texture, and intensity features from the segmented region. Finally, the classification task is performed with the help of logistic activation function between the testing and training image with higher accuracy and lesser error rate. At last, the outcome is determined by an output layer. The observed results show a better analysis of GPPPRMFE-DNL, compared with the two conventional methods.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115914861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Home Monitoring System and Prediction of Power Consumption 智能家居用电监测系统与预测
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753722
L. Gladence, Sangeetha K K, S. S, R. S, Mercy Paul Selvan
Automation is a popular topic in the twenty-first century, and it has become an indispensable part of everyday life. Human labor, time, work, and some human errors are all eliminated under automation. And also many natural resources are on the verge of Renewable energy sources that have not yet achieved the point of total self-sufficiency are now in danger. In this situation, energy efficiency and appropriate power sharing are essential. In this article, we employed the smart meter concept to continuously monitor energy usage and warn the consumer when it surpasses a specified threshold. A customized Mobile Application and hardware module are created to measure the energy used by each item in a home, estimate the monthly electricity bill, and anticipate power usage for future dates. In this method, the user could now create a preferred bill, and when the electricity use reaches the specified threshold, it will be notified via application.This system furthermore employs a technology to establish a connected device's tracking rate, making it an energy-efficient tool in and of itself. A current sensor, Voltage sensor and a Micro - controller was used to operate the hardware components.The software application was created to keep track of electricity costs. The system uses current data to forecast meter readings for the coming months. and predicts the electricity usage based on their power consumption.
自动化是21世纪的热门话题,它已经成为日常生活中不可或缺的一部分。人工、时间、工作和一些人为错误在自动化下都被消除了。而且许多自然资源也处于边缘,可再生能源尚未达到完全自给自足的地步,现在正处于危险之中。在这种情况下,能源效率和适当的权力分享是必不可少的。在本文中,我们采用智能电表的概念来持续监测能源使用情况,并在超过指定阈值时向消费者发出警告。一个定制的移动应用程序和硬件模块被创建来测量家庭中每个项目使用的能源,估计每月的电费,并预测未来日期的用电量。在这种方法中,用户现在可以创建一个首选账单,当用电量达到指定的阈值时,它将通过应用程序通知。该系统还采用了一种技术来建立连接设备的跟踪速率,使其本身成为一种节能工具。采用电流传感器、电压传感器和单片机对硬件元件进行控制。该软件应用程序的创建是为了跟踪电费。该系统使用当前数据来预测未来几个月的仪表读数。并根据他们的耗电量预测用电量。
{"title":"Smart Home Monitoring System and Prediction of Power Consumption","authors":"L. Gladence, Sangeetha K K, S. S, R. S, Mercy Paul Selvan","doi":"10.1109/ICCMC53470.2022.9753722","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753722","url":null,"abstract":"Automation is a popular topic in the twenty-first century, and it has become an indispensable part of everyday life. Human labor, time, work, and some human errors are all eliminated under automation. And also many natural resources are on the verge of Renewable energy sources that have not yet achieved the point of total self-sufficiency are now in danger. In this situation, energy efficiency and appropriate power sharing are essential. In this article, we employed the smart meter concept to continuously monitor energy usage and warn the consumer when it surpasses a specified threshold. A customized Mobile Application and hardware module are created to measure the energy used by each item in a home, estimate the monthly electricity bill, and anticipate power usage for future dates. In this method, the user could now create a preferred bill, and when the electricity use reaches the specified threshold, it will be notified via application.This system furthermore employs a technology to establish a connected device's tracking rate, making it an energy-efficient tool in and of itself. A current sensor, Voltage sensor and a Micro - controller was used to operate the hardware components.The software application was created to keep track of electricity costs. The system uses current data to forecast meter readings for the coming months. and predicts the electricity usage based on their power consumption.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol for Wireless Sensor Networks 基于黑猩猩优化算法的无线传感器网络能量感知安全路由协议
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753826
P. Manjula, S. Baghavathi Priya
Wireless sensor network (WSN) comprises a massive collection of inexpensive, smart, and compact sensor nodes for data collection and tracking applications in real time. Availability of limited energy and security are considered as the major issues in the WSN. One of the most common energy efficient solutions for WSN is the routing protocol. Since the data transmission in WSN takes place in wireless links, security becomes a major issue and secure routing protocols need to be designed. In this aspect, this study develops a Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol (COA-EASRP) for WSN. The proposed COA-EASRP technique mainly focuses to derive optimal routes in WSN and thereby accomplishes security. In addition, the COA-EASRP technique has derived an objective functioning involving different parameters namely energy, trust, and delay. The route with maximum energy and trust with minimal delay will be chosen as optimal route by the COA-EASRP technique. In order to demonstrate the enhanced outcomes of the COA-EASRP approach, a series of simulations are implemented and the outcomes are examined in different metrics. The extensive comparative study reported the supremacy of the COA-EASRP technique compared to recent approaches.
无线传感器网络(WSN)由大量廉价、智能和紧凑的传感器节点组成,用于实时数据收集和跟踪应用。有限能量的可用性和安全性是无线传感器网络的主要问题。无线传感器网络最常见的节能解决方案之一是路由协议。由于无线传感器网络中的数据传输是在无线链路中进行的,因此安全性成为一个主要问题,需要设计安全的路由协议。为此,本研究开发了一种基于黑猩猩优化算法的无线传感器网络能量感知安全路由协议(COA-EASRP)。本文提出的COA-EASRP技术主要致力于在WSN中导出最优路由,从而实现安全。此外,COA-EASRP技术导出了涉及不同参数的目标函数,即能量、信任和延迟。利用COA-EASRP技术选择能量最大、信任值最小、时延最小的路由作为最优路由。为了证明COA-EASRP方法的增强结果,实施了一系列模拟,并以不同的指标对结果进行了检验。广泛的比较研究报告了与最近的方法相比,COA-EASRP技术的优势。
{"title":"Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol for Wireless Sensor Networks","authors":"P. Manjula, S. Baghavathi Priya","doi":"10.1109/ICCMC53470.2022.9753826","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753826","url":null,"abstract":"Wireless sensor network (WSN) comprises a massive collection of inexpensive, smart, and compact sensor nodes for data collection and tracking applications in real time. Availability of limited energy and security are considered as the major issues in the WSN. One of the most common energy efficient solutions for WSN is the routing protocol. Since the data transmission in WSN takes place in wireless links, security becomes a major issue and secure routing protocols need to be designed. In this aspect, this study develops a Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol (COA-EASRP) for WSN. The proposed COA-EASRP technique mainly focuses to derive optimal routes in WSN and thereby accomplishes security. In addition, the COA-EASRP technique has derived an objective functioning involving different parameters namely energy, trust, and delay. The route with maximum energy and trust with minimal delay will be chosen as optimal route by the COA-EASRP technique. In order to demonstrate the enhanced outcomes of the COA-EASRP approach, a series of simulations are implemented and the outcomes are examined in different metrics. The extensive comparative study reported the supremacy of the COA-EASRP technique compared to recent approaches.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114896807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 6th International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1