首页 > 最新文献

2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)最新文献

英文 中文
Blockchain-enabled Device Authentication and Authorisation for Internet of Things 支持区块链的物联网设备认证和授权
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10084957
Raman Singh, Sean Sturley, B. Sharma, I. Dhaou
The Internet of Things (IoT) is the network of multiple devices known as “things” which includes sensors, security cameras, smart lights, smart TV, traffic lights etc. in the smart home or industrial environment. In many applications, these IoT devices are installed in open areas for example traffic lights/ security cameras in a smart city. Strong authentication and authorisation for these devices need to be deployed to ensure trust among IoT networks. IoT devices produce and forward security-sensitive data and hence confidentiality, authentication and proper authorisation should be the primary priority of an IoT system. Implementing Certificate Authority-based digital certificate solutions is costly because of the number of devices involved in IoT networks. Blockchain is a decentralized ledger-based technology which can help to provide seamless yet cost-effective solutions for confidentiality, authentication, and authorisation for IoT environments. A blockchain-based system for device registration, authentication, authorisation, and data confidentiality is proposed. The paper shows the methodological and procedural details of the proposed security scheme.
物联网(IoT)是由多个被称为“物”的设备组成的网络,包括智能家居或工业环境中的传感器、安全摄像头、智能灯、智能电视、交通信号灯等。在许多应用中,这些物联网设备安装在开放区域,例如智慧城市中的交通信号灯/安全摄像头。需要为这些设备部署强大的身份验证和授权,以确保物联网网络之间的信任。物联网设备产生并转发安全敏感数据,因此保密性、身份验证和适当授权应该是物联网系统的首要任务。由于物联网网络中涉及的设备数量众多,实施基于证书颁发机构的数字证书解决方案成本高昂。区块链是一种分散的基于分类账的技术,可以帮助为物联网环境的机密性、身份验证和授权提供无缝且经济高效的解决方案。提出了一种基于区块链的设备注册、认证、授权和数据保密系统。本文展示了所提出的安全方案的方法和程序细节。
{"title":"Blockchain-enabled Device Authentication and Authorisation for Internet of Things","authors":"Raman Singh, Sean Sturley, B. Sharma, I. Dhaou","doi":"10.1109/ICAISC56366.2023.10084957","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10084957","url":null,"abstract":"The Internet of Things (IoT) is the network of multiple devices known as “things” which includes sensors, security cameras, smart lights, smart TV, traffic lights etc. in the smart home or industrial environment. In many applications, these IoT devices are installed in open areas for example traffic lights/ security cameras in a smart city. Strong authentication and authorisation for these devices need to be deployed to ensure trust among IoT networks. IoT devices produce and forward security-sensitive data and hence confidentiality, authentication and proper authorisation should be the primary priority of an IoT system. Implementing Certificate Authority-based digital certificate solutions is costly because of the number of devices involved in IoT networks. Blockchain is a decentralized ledger-based technology which can help to provide seamless yet cost-effective solutions for confidentiality, authentication, and authorisation for IoT environments. A blockchain-based system for device registration, authentication, authorisation, and data confidentiality is proposed. The paper shows the methodological and procedural details of the proposed security scheme.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart and Secure IoT based Remote Real-Time Radiation Detection and Measurement System 基于智能和安全物联网的远程实时辐射检测和测量系统
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085583
K. Saleem, Azam Adel Alajroosh, R. Ouni, W. Mansoor, A. Gawanmeh
This paper proposes a secure internet of things (IoT) based smart radiation detection and measurement system. The Waspmote platform is utilized to build an intelligent IoT station that communicates over 3rd Generation (3G) cellular communication for transferring data to the cloud without redundancy. The IoT radiations monitoring station is enabled with an advanced encryption standard (AES) 256-bit algorithm for onboard data encryption and transfer of the message securely. The message is then stored in the same encrypted form over the cloud to ensure security and privacy. Moreover, the website is developed to decrypt and display as per user input, whether real-time or historical. The experimental results clearly demonstrate the efficiency of the radiation monitoring system with end-to-end data security.
提出了一种基于物联网的安全智能辐射检测与测量系统。Waspmote平台用于构建智能物联网站,该站通过第三代(3G)蜂窝通信进行通信,可将数据无冗余地传输到云端。物联网辐射监测站采用先进的加密标准(AES) 256位算法,用于机载数据加密和安全传输消息。然后,消息以相同的加密形式存储在云上,以确保安全性和隐私性。此外,该网站被开发为根据用户输入进行解密和显示,无论是实时的还是历史的。实验结果清楚地证明了端到端数据安全的辐射监测系统的有效性。
{"title":"Smart and Secure IoT based Remote Real-Time Radiation Detection and Measurement System","authors":"K. Saleem, Azam Adel Alajroosh, R. Ouni, W. Mansoor, A. Gawanmeh","doi":"10.1109/ICAISC56366.2023.10085583","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085583","url":null,"abstract":"This paper proposes a secure internet of things (IoT) based smart radiation detection and measurement system. The Waspmote platform is utilized to build an intelligent IoT station that communicates over 3rd Generation (3G) cellular communication for transferring data to the cloud without redundancy. The IoT radiations monitoring station is enabled with an advanced encryption standard (AES) 256-bit algorithm for onboard data encryption and transfer of the message securely. The message is then stored in the same encrypted form over the cloud to ensure security and privacy. Moreover, the website is developed to decrypt and display as per user input, whether real-time or historical. The experimental results clearly demonstrate the efficiency of the radiation monitoring system with end-to-end data security.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124391954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approach to Anomaly Detection Attacks Classification in IoT Devices 物联网设备异常检测攻击分类的机器学习方法
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085349
Aisha Al Obaidli, Deema Mansour, S. Abdulhamid, Nadhir Ben Halima, A. Al-Ghushami
Internet of Things (IoT) devices have a dark side could be used against the users or threaten the user by hackers and intruders. In addition, IoT devices have some security issues because the devices are basically connected to the internet and are more likely to get mishandled by hackers using anomaly attacks. In this paper, we proposed the application machine algorithms to detect anomaly attacks in IoT devices. The selected algorithms include are the Support Vector Machine (SVM) and Random Forest (RF). The SVM and RF are powerful supervised learning method that was utilized for both detection and feature selection. A standard anomaly dataset called the NSL-KDD dataset was used for the experimentation in arff format. The results shows an accuracy of approximately 99.9% and 97.9% with RF and SVM respectively, while a false positive rate of 0.1% was achieved in all scenarios for classification of anomaly attacks in IoT devices. This shows that the proposed method RF has higher accuracy than previous literatures, which is very promising. The RF and SVM posted a very encouraging recall and precision as well.
物联网(IoT)设备有其黑暗的一面,可能被黑客和入侵者用来对付用户或威胁用户。此外,物联网设备存在一些安全问题,因为这些设备基本上是连接到互联网的,更有可能被使用异常攻击的黑客错误处理。在本文中,我们提出了应用机器算法来检测物联网设备中的异常攻击。选择的算法包括支持向量机(SVM)和随机森林(RF)。支持向量机和射频是一种强大的监督学习方法,可用于检测和特征选择。实验采用arff格式的标准异常数据集NSL-KDD数据集。结果表明,RF和SVM对物联网设备异常攻击分类的准确率分别约为99.9%和97.9%,在所有场景下的假阳性率均为0.1%。这表明该方法具有比以往文献更高的精度,具有广阔的应用前景。RF和SVM的召回率和准确率也非常令人鼓舞。
{"title":"Machine Learning Approach to Anomaly Detection Attacks Classification in IoT Devices","authors":"Aisha Al Obaidli, Deema Mansour, S. Abdulhamid, Nadhir Ben Halima, A. Al-Ghushami","doi":"10.1109/ICAISC56366.2023.10085349","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085349","url":null,"abstract":"Internet of Things (IoT) devices have a dark side could be used against the users or threaten the user by hackers and intruders. In addition, IoT devices have some security issues because the devices are basically connected to the internet and are more likely to get mishandled by hackers using anomaly attacks. In this paper, we proposed the application machine algorithms to detect anomaly attacks in IoT devices. The selected algorithms include are the Support Vector Machine (SVM) and Random Forest (RF). The SVM and RF are powerful supervised learning method that was utilized for both detection and feature selection. A standard anomaly dataset called the NSL-KDD dataset was used for the experimentation in arff format. The results shows an accuracy of approximately 99.9% and 97.9% with RF and SVM respectively, while a false positive rate of 0.1% was achieved in all scenarios for classification of anomaly attacks in IoT devices. This shows that the proposed method RF has higher accuracy than previous literatures, which is very promising. The RF and SVM posted a very encouraging recall and precision as well.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Short Review on Faster and More Reliable TCP Reassembly for High-Speed Networks in Deep Packet Inspection 高速网络中基于深度包检测的更快、更可靠的TCP重组技术综述
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085644
Sobia Arshad, Rida Zanib, Adeel Akram, Talha Saeed
For Network Intrusion Detection and Prevention Systems (NIDPS), Deep Packet Inspection (DPI) requires matching the payload against regular expressions and fixed strings to identify attack signatures. Such attack strings can span more than one IP fragment or TCP segment. This issue can lead to false results because strings cannot be identified this way. Therefore, to accurately identify such attack strings we need to reassemble traffic packets before string matching. Although various hardware-based solutions are provided for improvements at the TCP layer that includes reassembly too. The requirements of reassembly architectures which are suited to particular requirements of DPI systems, are reordering of segments or fragments and tracking of streams in bulk numbers. Along with this, it has to deal with ambiguities that might be present in IP fragmentation or TCP segmentation which can be done by traffic normalization or target-based reassembly. Therefore, in this paper, we present a short review of these TCP reassembly efforts. Then, we suggest solutions and approaches implement TCP reassembly for High-Speed Networks.
对于网络入侵检测与防御系统(NIDPS)来说,DPI (Deep Packet Inspection)是通过将负载与正则表达式和固定字符串进行匹配来识别攻击特征。这种攻击字符串可以跨越多个IP分片或TCP段。这个问题可能导致错误的结果,因为不能通过这种方式识别字符串。因此,为了准确识别此类攻击字符串,需要在匹配字符串之前对流量报文进行重组。尽管提供了各种基于硬件的解决方案来改进TCP层,其中也包括重新组装。适合DPI系统特殊要求的重组体系结构的要求是对片段或片段进行重新排序和批量跟踪流。与此同时,它还必须处理IP碎片或TCP分段中可能出现的歧义,这可以通过流量规范化或基于目标的重组来完成。因此,在本文中,我们简要回顾了这些TCP重组工作。在此基础上,提出了实现高速网络TCP重组的解决方案和方法。
{"title":"A Short Review on Faster and More Reliable TCP Reassembly for High-Speed Networks in Deep Packet Inspection","authors":"Sobia Arshad, Rida Zanib, Adeel Akram, Talha Saeed","doi":"10.1109/ICAISC56366.2023.10085644","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085644","url":null,"abstract":"For Network Intrusion Detection and Prevention Systems (NIDPS), Deep Packet Inspection (DPI) requires matching the payload against regular expressions and fixed strings to identify attack signatures. Such attack strings can span more than one IP fragment or TCP segment. This issue can lead to false results because strings cannot be identified this way. Therefore, to accurately identify such attack strings we need to reassemble traffic packets before string matching. Although various hardware-based solutions are provided for improvements at the TCP layer that includes reassembly too. The requirements of reassembly architectures which are suited to particular requirements of DPI systems, are reordering of segments or fragments and tracking of streams in bulk numbers. Along with this, it has to deal with ambiguities that might be present in IP fragmentation or TCP segmentation which can be done by traffic normalization or target-based reassembly. Therefore, in this paper, we present a short review of these TCP reassembly efforts. Then, we suggest solutions and approaches implement TCP reassembly for High-Speed Networks.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123239316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Vision-Based Military Tank Recognition Using Object Detection Technique: An application of the YOLO Framework 基于计算机视觉的军用坦克目标检测识别:YOLO框架的应用
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085552
Sikandar Ali, Abdullah, Ali Athar, Maisam Ali, Ali Hussain, Hee-Cheol Kim
Military object detection is an indispensable and challenging task for defence systems which includes the tracking, tracing, security, and surveillance of any territory or region. These systems should be very efficient, reliable, and accurate in executing their functions. A minute errant may result in mass destruction and loss. So automatic real-time object detections are imperative in today’s world. Although over the years, different traditional approaches and techniques have been used for the detection of military equipment, warheads, and other defence-related objects yet the efficiency and accuracy of those techniques are comparatively low compared to the artificial intelligence-based object detection techniques. Therefore, we demonstrate the latest computer vision-based real-time object detection technique to detect real-time military objects with high accuracy and precision. We introduced YOLOv5 for the detection of military tanks and flags. This model successfully detects the targeted objects i.e., tank and flag with high confidence and precision. We trained and evaluated the performance of YOLOv3, YOLOv4, and four versions of the YOLOv5 model i.e., YOLOVv5s, YOLOv5m, YOLOV51, YOLOV5x1 with 922 images consisting of tank and flag objects. The dataset has been divided into 80% training, 10% validation, and 10% testing. The detection results of all six YOLO versions are compared and evaluated. The experimental results showed that the YOLOv5xl achieved higher performance. The precision, recall, mAP_0.5, and mAP_0.95 were 0.99, 0.995, 0.995, and 0.892, respectively. Since YOLOv5 is one of the latest and fastest real-time object detection approaches so this model will empower and enhance the military surveillance systems by enabling the military personnels to take prompt and proactive actions against any potential threats.
军事目标探测是国防系统必不可少的和具有挑战性的任务,包括对任何领土或地区的跟踪、跟踪、安全和监视。这些系统在执行其功能时应该非常高效、可靠和准确。一分钟的失误可能导致大规模的破坏和损失。因此,自动实时目标检测在当今世界是势在必行的。尽管多年来,不同的传统方法和技术被用于探测军事装备、弹头和其他与国防有关的物体,但与基于人工智能的物体探测技术相比,这些技术的效率和准确性相对较低。因此,我们展示了最新的基于计算机视觉的实时目标检测技术,以高精度和精密度检测实时军事目标。我们推出了YOLOv5来探测军用坦克和旗帜。该模型以较高的置信度和精度成功地检测了目标物体,即坦克和旗帜。我们对YOLOv3、YOLOv4和YOLOv5模型的四个版本(YOLOVv5s、YOLOv5m、YOLOV51、YOLOV5x1)进行了训练和性能评估,其中包含922张由坦克和旗帜物体组成的图像。数据集被分为80%的训练,10%的验证和10%的测试。比较和评价了6个YOLO版本的检测结果。实验结果表明,YOLOv5xl实现了更高的性能。查准率为0.99,查全率为0.995,查全率为0.995,查全率为0.892。由于YOLOv5是最新和最快的实时目标检测方法之一,因此该模型将通过使军事人员能够对任何潜在威胁采取迅速和积极的行动来增强和增强军事监视系统。
{"title":"Computer Vision-Based Military Tank Recognition Using Object Detection Technique: An application of the YOLO Framework","authors":"Sikandar Ali, Abdullah, Ali Athar, Maisam Ali, Ali Hussain, Hee-Cheol Kim","doi":"10.1109/ICAISC56366.2023.10085552","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085552","url":null,"abstract":"Military object detection is an indispensable and challenging task for defence systems which includes the tracking, tracing, security, and surveillance of any territory or region. These systems should be very efficient, reliable, and accurate in executing their functions. A minute errant may result in mass destruction and loss. So automatic real-time object detections are imperative in today’s world. Although over the years, different traditional approaches and techniques have been used for the detection of military equipment, warheads, and other defence-related objects yet the efficiency and accuracy of those techniques are comparatively low compared to the artificial intelligence-based object detection techniques. Therefore, we demonstrate the latest computer vision-based real-time object detection technique to detect real-time military objects with high accuracy and precision. We introduced YOLOv5 for the detection of military tanks and flags. This model successfully detects the targeted objects i.e., tank and flag with high confidence and precision. We trained and evaluated the performance of YOLOv3, YOLOv4, and four versions of the YOLOv5 model i.e., YOLOVv5s, YOLOv5m, YOLOV51, YOLOV5x1 with 922 images consisting of tank and flag objects. The dataset has been divided into 80% training, 10% validation, and 10% testing. The detection results of all six YOLO versions are compared and evaluated. The experimental results showed that the YOLOv5xl achieved higher performance. The precision, recall, mAP_0.5, and mAP_0.95 were 0.99, 0.995, 0.995, and 0.892, respectively. Since YOLOv5 is one of the latest and fastest real-time object detection approaches so this model will empower and enhance the military surveillance systems by enabling the military personnels to take prompt and proactive actions against any potential threats.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XSS Filter detection using Trust Region Policy Optimization 基于信任域策略优化的XSS过滤器检测
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085076
Biswajit Mondal, Abhijit Banerjee, Subir Gupta
Cross-site scripting (XSS)has gotten little attention regarding detecting and keeping it secure, leaving artificial intelligence systems susceptible to assault. It is crucial to determine ways to make the detecting system more attack-resistant. This study aims to employ Trust Region Policy optimization (TRPO) reinforcement learning techniques to enhance XSS detection and prevent adversarial attacks. Before mining the model’s hostile inputs, the model’s information is obtained using a reinforcement learning framework. Second, a detection method and an adversarial method are simultaneously trained. New damaging data is introduced to the detection model every cycle to retrain it. The proposed XSS model mines risky inputs that black-box or white-box detection approaches miss during testing. It has been proved that the escape rate can be decreased by simultaneously training the detection technique and the attack model. It increases the models’ capacity for self-defense.
跨站点脚本(XSS)在检测和保护它的安全方面很少受到关注,这使得人工智能系统容易受到攻击。确定使检测系统更具抗攻击能力的方法是至关重要的。本研究旨在采用信任区域策略优化(TRPO)强化学习技术来增强XSS检测和防止对抗性攻击。在挖掘模型的敌对输入之前,使用强化学习框架获得模型的信息。其次,同时训练检测方法和对抗方法。每个周期将新的损坏数据引入检测模型,对其进行再训练。提出的XSS模型挖掘了黑盒或白盒检测方法在测试过程中遗漏的风险输入。实验证明,通过同时训练检测技术和攻击模型,可以降低攻击的逃逸率。它增加了模型的自卫能力。
{"title":"XSS Filter detection using Trust Region Policy Optimization","authors":"Biswajit Mondal, Abhijit Banerjee, Subir Gupta","doi":"10.1109/ICAISC56366.2023.10085076","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085076","url":null,"abstract":"Cross-site scripting (XSS)has gotten little attention regarding detecting and keeping it secure, leaving artificial intelligence systems susceptible to assault. It is crucial to determine ways to make the detecting system more attack-resistant. This study aims to employ Trust Region Policy optimization (TRPO) reinforcement learning techniques to enhance XSS detection and prevent adversarial attacks. Before mining the model’s hostile inputs, the model’s information is obtained using a reinforcement learning framework. Second, a detection method and an adversarial method are simultaneously trained. New damaging data is introduced to the detection model every cycle to retrain it. The proposed XSS model mines risky inputs that black-box or white-box detection approaches miss during testing. It has been proved that the escape rate can be decreased by simultaneously training the detection technique and the attack model. It increases the models’ capacity for self-defense.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Content-Base Recommendation Algorithms on Mobile Travel Applications 基于内容的推荐算法在移动旅游应用中的应用
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085680
Henriques Zacarias, Geraldo Cangondo, Leonice Souza-Pereira, N. Garcia, Bruno M. C. Silva, Nuno Pombo
Tourism is a major contributor to economic, social, and cultural development for countries and territories. It allows for the understanding of different cultures and customs, and the digital era, with its abundance of mobile technology, allows travellers to experience touristic activities while staying connected to the digital world. Mobile technologies can enhance the traveller’s experience and provide accurate recommendations. We propose a novel mobile recommendation system, which includes its architecture, components, and relevant features. The results showed that the K-means clustering model used is suitable, as evaluated by the Silhouette score, Calinski-Harabasz, and Davies-Bouldin indexes.
旅游业是国家和地区经济、社会和文化发展的主要贡献者。它使人们能够了解不同的文化和习俗,而数字时代,凭借丰富的移动技术,旅行者可以在体验旅游活动的同时与数字世界保持联系。移动技术可以提高旅行者的体验,并提供准确的建议。本文提出了一种新型的移动推荐系统,包括其架构、组成和相关特征。通过Silhouette评分、Calinski-Harabasz和Davies-Bouldin指数对K-means聚类模型进行了评价,结果表明K-means聚类模型是合适的。
{"title":"Application of Content-Base Recommendation Algorithms on Mobile Travel Applications","authors":"Henriques Zacarias, Geraldo Cangondo, Leonice Souza-Pereira, N. Garcia, Bruno M. C. Silva, Nuno Pombo","doi":"10.1109/ICAISC56366.2023.10085680","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085680","url":null,"abstract":"Tourism is a major contributor to economic, social, and cultural development for countries and territories. It allows for the understanding of different cultures and customs, and the digital era, with its abundance of mobile technology, allows travellers to experience touristic activities while staying connected to the digital world. Mobile technologies can enhance the traveller’s experience and provide accurate recommendations. We propose a novel mobile recommendation system, which includes its architecture, components, and relevant features. The results showed that the K-means clustering model used is suitable, as evaluated by the Silhouette score, Calinski-Harabasz, and Davies-Bouldin indexes.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133796790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferential Statistics and Visualization Techniques for Aspect Analysis 面向方面分析的推理统计和可视化技术
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085093
N. Sharma, M. Mangla, Mohammed Ishaque, S. Mohanty
Aspect Analysis of a multidimensional dataset aims to address diverse queries of the data analysts by analyzing different aspect of the data. Thus, it caters to the challenges faced by data analysts by presenting the solution to the most dilemmatic questions. Current research work focuses to present the various steps carried out during aspect analysis through statistical and visualization methods. For aspect analysis, authors have considered a dataset containing information about bookings of city hotel and resort hotels. The various features in the dataset are duration of stay, period of stay, and number of visitors (adults and children) among others. In order to maintain the privacy, authors have removed all personal information from the dataset. This aspect analysis of the data enables the owner to gain in-depth knowledge of the data that can be employed towards revenue generation, enhanced quality of service and well preparedness. Additionally, authors have also made an attempt to analyze the pattern in various actions of customers viz. arrival time, cancellations, and repeated check-ins etc. Understanding of such patterns not only helps in data analytics but also helps in boosting the sales.
多维数据集的方面分析旨在通过分析数据的不同方面来解决数据分析人员的各种查询。因此,它迎合了数据分析师所面临的挑战,为最棘手的问题提供了解决方案。目前的研究工作重点是通过统计和可视化的方法来呈现方面分析过程中所进行的各个步骤。对于方面分析,作者考虑了一个包含城市酒店和度假酒店预订信息的数据集。数据集中的各种特征包括逗留时间、逗留时间和访客人数(成人和儿童)等。为了保护隐私,作者从数据集中删除了所有个人信息。这种数据方面的分析使业主能够深入了解数据,这些数据可以用于创收、提高服务质量和做好准备。此外,作者还尝试分析了客户的各种行为模式,如到达时间、取消和重复入住等。了解这些模式不仅有助于数据分析,还有助于促进销售。
{"title":"Inferential Statistics and Visualization Techniques for Aspect Analysis","authors":"N. Sharma, M. Mangla, Mohammed Ishaque, S. Mohanty","doi":"10.1109/ICAISC56366.2023.10085093","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085093","url":null,"abstract":"Aspect Analysis of a multidimensional dataset aims to address diverse queries of the data analysts by analyzing different aspect of the data. Thus, it caters to the challenges faced by data analysts by presenting the solution to the most dilemmatic questions. Current research work focuses to present the various steps carried out during aspect analysis through statistical and visualization methods. For aspect analysis, authors have considered a dataset containing information about bookings of city hotel and resort hotels. The various features in the dataset are duration of stay, period of stay, and number of visitors (adults and children) among others. In order to maintain the privacy, authors have removed all personal information from the dataset. This aspect analysis of the data enables the owner to gain in-depth knowledge of the data that can be employed towards revenue generation, enhanced quality of service and well preparedness. Additionally, authors have also made an attempt to analyze the pattern in various actions of customers viz. arrival time, cancellations, and repeated check-ins etc. Understanding of such patterns not only helps in data analytics but also helps in boosting the sales.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Sentiment Analysis Model with Majority Voting for Un-labeled Arabic Text 基于多数投票的非标注阿拉伯文本混合情感分析模型
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085303
Amal Alkabkabi, Mounira Taileb
A large scale of data is posted every day on the social media platforms. Sentiment analysis classification is one of the useful techniques to extract useful information from those data. To train sentiment analysis models there is a need for labeled data, and it is one of the challenging issues. The available datasets are collected and labeled manually by humans which is a time-consuming process. The identification of machine learning classifier that provides the best performance is a second issue in sentiment analysis. A new hybrid sentiment analysis model is proposed in this paper. It relies on the use of the lexicon-based approach and majority voting. The best performance of the proposed model is when using the set of classifiers: NB, LogReg and SGD, it outperforms all the models with a single classifier in terms of accuracy, precision, recall and F-score.
每天在社交媒体平台上都有大量的数据被发布。情感分析分类是从这些数据中提取有用信息的一种有用技术。为了训练情感分析模型,需要标记数据,这是一个具有挑战性的问题。可用的数据集是由人工收集和标记的,这是一个耗时的过程。识别提供最佳性能的机器学习分类器是情感分析中的第二个问题。提出了一种新的混合情感分析模型。它依赖于使用基于词典的方法和多数投票。所提出的模型的最佳性能是当使用分类器集:NB, LogReg和SGD时,它在准确率,精度,召回率和f分数方面优于所有使用单个分类器的模型。
{"title":"Hybrid Sentiment Analysis Model with Majority Voting for Un-labeled Arabic Text","authors":"Amal Alkabkabi, Mounira Taileb","doi":"10.1109/ICAISC56366.2023.10085303","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085303","url":null,"abstract":"A large scale of data is posted every day on the social media platforms. Sentiment analysis classification is one of the useful techniques to extract useful information from those data. To train sentiment analysis models there is a need for labeled data, and it is one of the challenging issues. The available datasets are collected and labeled manually by humans which is a time-consuming process. The identification of machine learning classifier that provides the best performance is a second issue in sentiment analysis. A new hybrid sentiment analysis model is proposed in this paper. It relies on the use of the lexicon-based approach and majority voting. The best performance of the proposed model is when using the set of classifiers: NB, LogReg and SGD, it outperforms all the models with a single classifier in terms of accuracy, precision, recall and F-score.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130267177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey - Soil Feature Analysis Using Clustering Techniques and Predict Various Crops in Madurai District 基于聚类技术的马杜赖地区土壤特征分析与作物预测
Pub Date : 2023-01-23 DOI: 10.1109/ICAISC56366.2023.10085317
D. Sakthipriya, T. Chandrakumar, B. Johnson, Kumar Jb Prem
In Tamil Nadu, seasonal soil fertility, rainfall, and temperature account for more than 65% of agricultural output. Soils are one of the most valuable natural resources on the planet. The study’s goal was to analyze and survey the historical changes in soil parameter Index of Madurai District and Taluks, South India, using Clustering techniques of unsupervised learning to perform well for this proposed work. In this proposed work to involved, the survey should focus on the Soil parameters (N-Nitrogen, P-Phosphorus, K-potassium), rainfall, and temperature data retrieved from the agriculture government portal for the last five years. The study compares two machine learning clustering techniques, Hierarchical Clustering and K-Means Clustering in estimating soil features at Madurai Taluks. With the use of new agricultural technology, this proposed initiative intends to offer a better suggestion for obtaining an acceptable level of crop output to the Madurai surrounding blocks to get more benefits.
在泰米尔纳德邦,季节性土壤肥力、降雨量和温度占农业产量的65%以上。土壤是地球上最宝贵的自然资源之一。该研究的目标是分析和调查印度南部马杜赖地区和塔鲁克地区土壤参数指数的历史变化,使用无监督学习的聚类技术来完成这项工作。在这项拟议的工作中,调查应该集中在土壤参数(n -氮,p -磷,k -钾),降雨量和温度数据从农业政府门户网站检索了近五年。该研究比较了两种机器学习聚类技术,分层聚类和K-Means聚类在估计马杜赖塔鲁克的土壤特征。通过使用新的农业技术,该倡议旨在为马杜赖周围的区块提供更好的建议,以获得可接受的作物产量水平,从而获得更多的利益。
{"title":"A Survey - Soil Feature Analysis Using Clustering Techniques and Predict Various Crops in Madurai District","authors":"D. Sakthipriya, T. Chandrakumar, B. Johnson, Kumar Jb Prem","doi":"10.1109/ICAISC56366.2023.10085317","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085317","url":null,"abstract":"In Tamil Nadu, seasonal soil fertility, rainfall, and temperature account for more than 65% of agricultural output. Soils are one of the most valuable natural resources on the planet. The study’s goal was to analyze and survey the historical changes in soil parameter Index of Madurai District and Taluks, South India, using Clustering techniques of unsupervised learning to perform well for this proposed work. In this proposed work to involved, the survey should focus on the Soil parameters (N-Nitrogen, P-Phosphorus, K-potassium), rainfall, and temperature data retrieved from the agriculture government portal for the last five years. The study compares two machine learning clustering techniques, Hierarchical Clustering and K-Means Clustering in estimating soil features at Madurai Taluks. With the use of new agricultural technology, this proposed initiative intends to offer a better suggestion for obtaining an acceptable level of crop output to the Madurai surrounding blocks to get more benefits.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116265200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1