首页 > 最新文献

Recent Trends in Intensive Computing最新文献

英文 中文
MISP: Model for IaaS Security and Privacy MISP: IaaS安全和隐私模型
Pub Date : 2021-12-01 DOI: 10.3233/apc210222
IndraKumar Sahua, Manisha J Nenea
Paradigm shift towards cloud computing offers plethora of advantages both for cloud users and Cloud Service Provider (CSP). For cloud users, it offers saving of cost, scaling of resources, pay per use, elastic and on-demand services. On the other hand, it offers centralized resource management and provisioning of operations, safety and security for CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components and software) over the internet, Infrastructure-as-a-Service (IaaS) serves as fundamental layer for all other delivery models. Along with benefits of IaaS, there exists several security and privacy issues and threats to confidentiality, integrity, authentication, access control and availability. In this paper, detailed study of IaaS components, associated security and privacy issues are explored and counter measures for the same are determined. Furthermore, as a result of the study, Model for IaaS Security and Privacy (MISP) is proposed. The model presents a cubical structure and adds more features than the existing models to enhance the security and privacy of data and operations and guide security assessment for safer adoption by enterprises
向云计算的范式转变为云用户和云服务提供商(CSP)提供了大量的优势。对于云用户来说,它可以节省成本、扩展资源、按次付费、弹性和按需服务。另一方面,它为CSP提供集中的资源管理和运营、安全和保障。通过在互联网上持有多个虚拟IT资源(cpu、存储服务器、网络组件和软件),基础设施即服务(IaaS)作为所有其他交付模型的基础层。除了IaaS的好处之外,还存在一些安全和隐私问题,以及对机密性、完整性、身份验证、访问控制和可用性的威胁。本文对IaaS组件进行了详细的研究,探讨了相关的安全和隐私问题,并确定了相应的对策。在此基础上,提出了IaaS安全与隐私模型(MISP)。该模型呈现立方体结构,比现有模型增加了更多的功能,增强了数据和操作的安全性和隐私性,并指导安全评估,供企业更安全地采用
{"title":"MISP: Model for IaaS Security and Privacy","authors":"IndraKumar Sahua, Manisha J Nenea","doi":"10.3233/apc210222","DOIUrl":"https://doi.org/10.3233/apc210222","url":null,"abstract":"Paradigm shift towards cloud computing offers plethora of advantages both for cloud users and Cloud Service Provider (CSP). For cloud users, it offers saving of cost, scaling of resources, pay per use, elastic and on-demand services. On the other hand, it offers centralized resource management and provisioning of operations, safety and security for CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components and software) over the internet, Infrastructure-as-a-Service (IaaS) serves as fundamental layer for all other delivery models. Along with benefits of IaaS, there exists several security and privacy issues and threats to confidentiality, integrity, authentication, access control and availability. In this paper, detailed study of IaaS components, associated security and privacy issues are explored and counter measures for the same are determined. Furthermore, as a result of the study, Model for IaaS Security and Privacy (MISP) is proposed. The model presents a cubical structure and adds more features than the existing models to enhance the security and privacy of data and operations and guide security assessment for safer adoption by enterprises","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Human Gesture Recognition: Methods, Datasets and Strategies 实时人类手势识别:方法、数据集和策略
Pub Date : 2021-12-01 DOI: 10.3233/apc210202
Rameez Shamalik, S. Koli
Gestures are universal means of communication without any language barrier. Detecting gestures and recognition of its meaning are key steps for researchers in computer vision. Majority of the work is done in sign language already. Sign language datasets are compared with respect to their usability and diversity in terms of various signs. This paper highlights the available datasets from three dimensional body scans to hand action gestures. Their usability and strategies used to achieve the desired results are also discussed. Major neural networks are evaluated in terms of varied parameters and feutures. A Methodology for effective gesture recognition in real is proposed. Lastly Results achieved through an Open CV in combination with Sci-kit learn library based technique for gesture recognition are presented and analyzed in terms of efficacy and efficiency.
手势是通用的交流方式,没有任何语言障碍。手势检测及其意义的识别是计算机视觉研究的关键步骤。大部分工作已经用手语完成了。手语数据集在各种符号方面的可用性和多样性进行了比较。本文重点介绍了从三维身体扫描到手势动作的可用数据集。还讨论了它们的可用性和实现预期结果的策略。主要的神经网络是根据不同的参数和特征来评估的。提出了一种现实中有效的手势识别方法。最后,介绍了基于Open CV和Sci-kit learn库技术的手势识别结果,并对其有效性和效率进行了分析。
{"title":"Real Time Human Gesture Recognition: Methods, Datasets and Strategies","authors":"Rameez Shamalik, S. Koli","doi":"10.3233/apc210202","DOIUrl":"https://doi.org/10.3233/apc210202","url":null,"abstract":"Gestures are universal means of communication without any language barrier. Detecting gestures and recognition of its meaning are key steps for researchers in computer vision. Majority of the work is done in sign language already. Sign language datasets are compared with respect to their usability and diversity in terms of various signs. This paper highlights the available datasets from three dimensional body scans to hand action gestures. Their usability and strategies used to achieve the desired results are also discussed. Major neural networks are evaluated in terms of varied parameters and feutures. A Methodology for effective gesture recognition in real is proposed. Lastly Results achieved through an Open CV in combination with Sci-kit learn library based technique for gesture recognition are presented and analyzed in terms of efficacy and efficiency.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EyePhone Technology: A Smart Wearable Device 眼听技术:一种智能可穿戴设备
Pub Date : 2021-12-01 DOI: 10.3233/apc210231
K. Kharade, S. Kharade, S. R. Ghatage, V. Kumbhar, T. Nandana Ravishankar, K. Vengatesan
In the past few decades, wearable sensors and devices have evolved into central technologies that have significantly impacted next-generation healthcare solutions in the previous decade. It is an age of incredibly cut-throat competition, even the youth. This technology is Hand-free, eyephone-operated telephone technology. It measures where the user’s eyes are located on the phone’s display employing a camera attached to the device. The typical work the eye bones assigned to eye tracking, eye blinking, detecting, etc., by way of eye-tracking, users can take care of their email, calendar, phone, etc. The leading technologies in use are a Human-Computer Interface (HCI) and a Human Phone Interface (HPI). It helps those with disabilities greatly. The IT Index is an expanded form of HCI. The use of mobile devices like smartphones and tablets is on the rise, and, to some extent, it could displace the use of desktops and laptops. Human-computer interaction is interested in the interaction between people and the computer system and between software and applications. Our focus is on this revolutionary new type of technology called the eye-phone.
在过去的几十年里,可穿戴传感器和设备已经发展成为核心技术,在过去的十年里对下一代医疗保健解决方案产生了重大影响。这是一个竞争异常激烈的时代,即使是年轻人。这项技术是免提、眼听筒操作的电话技术。它通过连接在手机上的摄像头测量用户眼睛在手机显示屏上的位置。典型的工作将眼骨分配到眼动追踪、眨眼、检测等,通过眼动追踪的方式,用户可以照看好自己的电子邮件、日历、电话等。目前使用的主要技术是人机界面(HCI)和人机电话界面(HPI)。它极大地帮助了残疾人。IT指数是HCI的扩展形式。智能手机和平板电脑等移动设备的使用正在增加,在某种程度上,它可能会取代台式机和笔记本电脑的使用。人机交互是指人与计算机系统之间以及软件与应用程序之间的交互。我们的重点是这种革命性的新型技术,叫做眼电话。
{"title":"EyePhone Technology: A Smart Wearable Device","authors":"K. Kharade, S. Kharade, S. R. Ghatage, V. Kumbhar, T. Nandana Ravishankar, K. Vengatesan","doi":"10.3233/apc210231","DOIUrl":"https://doi.org/10.3233/apc210231","url":null,"abstract":"In the past few decades, wearable sensors and devices have evolved into central technologies that have significantly impacted next-generation healthcare solutions in the previous decade. It is an age of incredibly cut-throat competition, even the youth. This technology is Hand-free, eyephone-operated telephone technology. It measures where the user’s eyes are located on the phone’s display employing a camera attached to the device. The typical work the eye bones assigned to eye tracking, eye blinking, detecting, etc., by way of eye-tracking, users can take care of their email, calendar, phone, etc. The leading technologies in use are a Human-Computer Interface (HCI) and a Human Phone Interface (HPI). It helps those with disabilities greatly. The IT Index is an expanded form of HCI. The use of mobile devices like smartphones and tablets is on the rise, and, to some extent, it could displace the use of desktops and laptops. Human-computer interaction is interested in the interaction between people and the computer system and between software and applications. Our focus is on this revolutionary new type of technology called the eye-phone.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123416185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Mining Cryptocurrencies 关于挖矿加密货币的调查
Pub Date : 2021-12-01 DOI: 10.3233/apc210212
Tejaswini Pawar, S. Shirsat, Yaminee Patil, Vijay R. Sonawane, Dhiraj A. Birari
Advanced monetary standards have acquired huge ubiquity nowadays. Bitcoin is the decentralized, disseminated, distributed virtual cash known cryptographic money. Bitcoin mining chips away at standard of the blockchain, which is believed to be one of this present century’s sharp advancement. The blockchain is the arrangement of blocks that are associated so that in the current block there is the hash of the past block. Any adjustment of information in any block in a blockchain brings about a blunder in the entire blockchain. A strategy called mining, where excavators settle a complex numerical riddle, produces Bitcoins. The excavators contend as quickly as time permits to mine the Bitcoin and guarantee the award. Mining should be possible by a solitary individual or by a pool, where a lot of excavators join to mine a solitary block in an organization.
如今,先进的货币标准已经无处不在。比特币是一种去中心化、分散化、分布式的虚拟现金,被称为加密货币。比特币挖矿的标准是区块链,这被认为是本世纪的重大进步之一。区块链是关联块的排列,因此在当前块中存在过去块的哈希值。对区块链中任何块的信息进行任何调整都会导致整个区块链出现错误。一种被称为挖矿的策略产生了比特币,挖矿者解决了一个复杂的数字谜语。挖矿者们在时间允许的情况下以最快的速度进行竞争,以挖出比特币并保证获奖。采矿应该可以由一个单独的个人或一个池,其中许多挖掘机在一个组织中加入到一个单独的区块中。
{"title":"A Survey on Mining Cryptocurrencies","authors":"Tejaswini Pawar, S. Shirsat, Yaminee Patil, Vijay R. Sonawane, Dhiraj A. Birari","doi":"10.3233/apc210212","DOIUrl":"https://doi.org/10.3233/apc210212","url":null,"abstract":"Advanced monetary standards have acquired huge ubiquity nowadays. Bitcoin is the decentralized, disseminated, distributed virtual cash known cryptographic money. Bitcoin mining chips away at standard of the blockchain, which is believed to be one of this present century’s sharp advancement. The blockchain is the arrangement of blocks that are associated so that in the current block there is the hash of the past block. Any adjustment of information in any block in a blockchain brings about a blunder in the entire blockchain. A strategy called mining, where excavators settle a complex numerical riddle, produces Bitcoins. The excavators contend as quickly as time permits to mine the Bitcoin and guarantee the award. Mining should be possible by a solitary individual or by a pool, where a lot of excavators join to mine a solitary block in an organization.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data 大数据环境下敏感数据的数据隐私保护与安全方法
Pub Date : 2021-12-01 DOI: 10.3233/apc210221
Rohit Ravindra Nikam, Rekha Shahapurkar
Data mining is a technique that explores the necessary data is extracted from large data sets. Privacy protection of data mining is about hiding the sensitive information or identity of breach security or without losing data usability. Sensitive data contains confidential information about individuals, businesses, and governments who must not agree upon before sharing or publishing his privacy data. Conserving data mining privacy has become a critical research area. Various evaluation metrics such as performance in terms of time efficiency, data utility, and degree of complexity or resistance to data mining techniques are used to estimate the privacy preservation of data mining techniques. Social media and smart phones produce tons of data every minute. To decision making, the voluminous data produced from the different sources can be processed and analyzed. But data analytics are vulnerable to breaches of privacy. One of the data analytics frameworks is recommendation systems commonly used by e-commerce sites such as Amazon, Flip Kart to recommend items to customers based on their purchasing habits that lead to characterized. This paper presents various techniques of privacy conservation, such as data anonymization, data randomization, generalization, data permutation, etc. such techniques which existing researchers use. We also analyze the gap between various processes and privacy preservation methods and illustrate how to overcome such issues with new innovative methods. Finally, our research describes the outcome summary of the entire literature.
数据挖掘是一种从大型数据集中提取必要数据的技术。数据挖掘的隐私保护是在不丢失数据可用性的前提下,隐藏敏感信息或身份信息。敏感数据包含有关个人、企业和政府的机密信息,这些信息在共享或发布其隐私数据之前不得达成一致。保护数据挖掘的隐私已成为一个重要的研究领域。各种评估指标,如时间效率方面的性能、数据效用、数据挖掘技术的复杂性或阻力程度,用于评估数据挖掘技术的隐私保护。社交媒体和智能手机每分钟都会产生大量数据。为了做出决策,可以对来自不同来源的大量数据进行处理和分析。但数据分析容易受到隐私侵犯的影响。其中一个数据分析框架是电子商务网站(如Amazon、Flip Kart)常用的推荐系统,它根据客户的购买习惯向他们推荐商品,从而导致特征化。本文介绍了现有研究人员使用的各种隐私保护技术,如数据匿名化、数据随机化、泛化、数据置换等。我们还分析了各种流程和隐私保护方法之间的差距,并说明了如何用新的创新方法克服这些问题。最后,我们的研究描述了整个文献的结果总结。
{"title":"Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data","authors":"Rohit Ravindra Nikam, Rekha Shahapurkar","doi":"10.3233/apc210221","DOIUrl":"https://doi.org/10.3233/apc210221","url":null,"abstract":"Data mining is a technique that explores the necessary data is extracted from large data sets. Privacy protection of data mining is about hiding the sensitive information or identity of breach security or without losing data usability. Sensitive data contains confidential information about individuals, businesses, and governments who must not agree upon before sharing or publishing his privacy data. Conserving data mining privacy has become a critical research area. Various evaluation metrics such as performance in terms of time efficiency, data utility, and degree of complexity or resistance to data mining techniques are used to estimate the privacy preservation of data mining techniques. Social media and smart phones produce tons of data every minute. To decision making, the voluminous data produced from the different sources can be processed and analyzed. But data analytics are vulnerable to breaches of privacy. One of the data analytics frameworks is recommendation systems commonly used by e-commerce sites such as Amazon, Flip Kart to recommend items to customers based on their purchasing habits that lead to characterized. This paper presents various techniques of privacy conservation, such as data anonymization, data randomization, generalization, data permutation, etc. such techniques which existing researchers use. We also analyze the gap between various processes and privacy preservation methods and illustrate how to overcome such issues with new innovative methods. Finally, our research describes the outcome summary of the entire literature.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A GSM Based Assistive Device for Blind, Deaf and Dumb 一种基于GSM的盲人、聋哑人辅助设备
Pub Date : 2021-12-01 DOI: 10.3233/apc210267
Lavanya Dhanesh, Monica S, Revathi R, Suganya S, Swetha Lakshmi K N
This paper tries to overcome the shortcomings of the recent technology that fails to enhance the communication between physically disabled people by designing an assistive device. This device uses a GSM modem with a SIM card and no smartphones are needed which makes the device affordable. Here, the sender sends the message to the phone number of the disabled person and he/she receives the SMS that gets converted to text and voice message and vibrations to Braille pad using a microcontroller which is easily readable by the disabled person.
本文试图通过设计一种辅助装置来克服当前技术不能增强残疾人之间交流的缺点。该设备使用带有SIM卡的GSM调制解调器,不需要智能手机,这使得该设备价格实惠。在这里,发送者将信息发送到残疾人的电话号码,他/她接收到短信,短信被转换为文本和语音信息,并通过微控制器振动到盲文板,残疾人很容易读懂。
{"title":"A GSM Based Assistive Device for Blind, Deaf and Dumb","authors":"Lavanya Dhanesh, Monica S, Revathi R, Suganya S, Swetha Lakshmi K N","doi":"10.3233/apc210267","DOIUrl":"https://doi.org/10.3233/apc210267","url":null,"abstract":"This paper tries to overcome the shortcomings of the recent technology that fails to enhance the communication between physically disabled people by designing an assistive device. This device uses a GSM modem with a SIM card and no smartphones are needed which makes the device affordable. Here, the sender sends the message to the phone number of the disabled person and he/she receives the SMS that gets converted to text and voice message and vibrations to Braille pad using a microcontroller which is easily readable by the disabled person.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compact Disc Shaped Microstrip Patch Antenna Using Inset Fed at 5GHz for Satellite Communications 一种用于5GHz卫星通信的嵌入式馈电光盘微带贴片天线
Pub Date : 2021-12-01 DOI: 10.3233/apc210181
A. Pon Bharathi, A. J. Wilson, S. Arun, V. Ramanathan
This examination work is focused around planning and simulating another kind of inset feed Disc Shaped Microstrip Patch Antenna (DSMPA) with Inset feed and Defected ground plane (DGP). By presenting a round space at the focal point of the ground plane, improved attributes of Microstrip patch antenna can be accomplished. The proposed Disc Shaped Microstrip patch antenna is reverberating at 5 GHz. Simulation has been finished by utilizing reenactment programming HFSS version15. From recreation results, it discovers that our examined Disc Shaped Microstrip patch antenna yields better return loss of - 25.1 dB & VSWR estimation of 0.96 dB. The examined DSMPA is yielding a higher radiation efficiency of 77.20 %. The minimized size and higher radiation efficiency contrasted with rectangular Microstrip patch antenna makes it all the more generally helpful for satellite communications.
本文研究了另一种具有插入馈电和缺陷地平面(DGP)的圆盘形微带贴片天线(DSMPA)的设计与仿真。通过在地平面焦点处呈现一个圆形空间,可以实现微带贴片天线属性的改进。所提出的圆盘状微带贴片天线在5ghz波段进行混响。利用重演程序HFSS version15完成了仿真。从重建结果中发现,我们检测的圆盘形微带贴片天线的回波损耗为- 25.1 dB,驻波比估计为0.96 dB。检测的DSMPA的辐射效率为77.20%。与矩形微带贴片天线相比,微带贴片天线体积小、辐射效率高,使其在卫星通信中具有更广泛的应用价值。
{"title":"A Compact Disc Shaped Microstrip Patch Antenna Using Inset Fed at 5GHz for Satellite Communications","authors":"A. Pon Bharathi, A. J. Wilson, S. Arun, V. Ramanathan","doi":"10.3233/apc210181","DOIUrl":"https://doi.org/10.3233/apc210181","url":null,"abstract":"This examination work is focused around planning and simulating another kind of inset feed Disc Shaped Microstrip Patch Antenna (DSMPA) with Inset feed and Defected ground plane (DGP). By presenting a round space at the focal point of the ground plane, improved attributes of Microstrip patch antenna can be accomplished. The proposed Disc Shaped Microstrip patch antenna is reverberating at 5 GHz. Simulation has been finished by utilizing reenactment programming HFSS version15. From recreation results, it discovers that our examined Disc Shaped Microstrip patch antenna yields better return loss of - 25.1 dB & VSWR estimation of 0.96 dB. The examined DSMPA is yielding a higher radiation efficiency of 77.20 %. The minimized size and higher radiation efficiency contrasted with rectangular Microstrip patch antenna makes it all the more generally helpful for satellite communications.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cascading of Air Quality Detector and Digital Data Transmission with Zero Error in Minimum Duration 空气质量检测器级联与最小持续时间零误差数字数据传输
Pub Date : 2021-12-01 DOI: 10.3233/apc210269
Anitha R, Veerasundaram M, Rajarajan S, Jaya Prakash E, NandhaKishore J, Ajay Krishnan S R
The paper proposes a system to monitor the environment air quality using an Arduino microcontroller, to enhance the quality IOT Technology is used. The utilization of IoT technology improves the method of monitoring various factors of the environment issues. The MQ-02 gas sensor is used to detect the various gases which are harmful to humans. A Wi-Fi module connects the whole system to the internet and an LCD is employed for the visual Output. This Automated Air management system may be a breakthrough to contribute an answer to the most important threat. The air quality detector overcomes the problems of the highly polluted areas which may be a major issue. This technique has features for the user to monitor the quantity of pollution on their smart devices using the appliance.
本文提出了一种基于Arduino微控制器的环境空气质量监测系统,利用物联网技术来提高环境空气质量。物联网技术的应用改进了对环境问题各种因素的监测方法。MQ-02气体传感器用于检测对人体有害的各种气体。Wi-Fi模块将整个系统连接到互联网,LCD用于视觉输出。这种自动化空气管理系统可能是一个突破,有助于解决最重要的威胁。空气质量检测仪克服了高污染地区的问题,这可能是一个主要问题。这项技术的特点是,用户可以使用该设备在智能设备上监测污染的数量。
{"title":"Cascading of Air Quality Detector and Digital Data Transmission with Zero Error in Minimum Duration","authors":"Anitha R, Veerasundaram M, Rajarajan S, Jaya Prakash E, NandhaKishore J, Ajay Krishnan S R","doi":"10.3233/apc210269","DOIUrl":"https://doi.org/10.3233/apc210269","url":null,"abstract":"The paper proposes a system to monitor the environment air quality using an Arduino microcontroller, to enhance the quality IOT Technology is used. The utilization of IoT technology improves the method of monitoring various factors of the environment issues. The MQ-02 gas sensor is used to detect the various gases which are harmful to humans. A Wi-Fi module connects the whole system to the internet and an LCD is employed for the visual Output. This Automated Air management system may be a breakthrough to contribute an answer to the most important threat. The air quality detector overcomes the problems of the highly polluted areas which may be a major issue. This technique has features for the user to monitor the quantity of pollution on their smart devices using the appliance.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chennai Water Resource Management Using GIS 基于GIS的金奈水资源管理
Pub Date : 2021-12-01 DOI: 10.3233/apc210220
Saral Purohit, Gadhiya Jay Dipakbhai, G. Abirami
Water scarcity is one of the biggest problems in the country of India, this problem is often caused by poor water resource management. Notably in India, the city of Chennai has had a water crisis going on for the past few years. On June 19th, 2019, the city officials declared that the city had run out of water. This was termed as ‘Day Zero’ where there was no water left. Most of the lakes of Chennai dried out. Poor water management and very less rainfall were the major reasons for this scarcity. Water resource management thus is of critical importance to ensure that water is utilized in the right way. So the aim of the proposed system is to evaluate the nature, significance, and rate of change in the water bodies of Chennai over a period of time using GIS/Remote sensing and assess the past and present conditions of water bodies in Chennai and to understand the dynamics and trends of change through various forms of spatial analysis. This is achieved by using different functionalities of ArcGIS and ArcMap and then analysing the obtained data and maps.
水资源短缺是印度面临的最大问题之一,这一问题往往是由水资源管理不善造成的。特别是在印度,金奈市在过去几年里一直存在水危机。2019年6月19日,该市官员宣布该市已经缺水。这被称为“零日”,没有水了。金奈的大部分湖泊都干涸了。水资源管理不善和降雨量非常少是造成这种短缺的主要原因。因此,水资源管理对于确保以正确的方式利用水资源至关重要。因此,该系统的目的是利用GIS/遥感技术评估金奈水体在一段时间内的性质、意义和变化速度,评估金奈水体过去和现在的状况,并通过各种形式的空间分析了解变化的动态和趋势。这是通过使用ArcGIS和ArcMap的不同功能,然后分析获得的数据和地图来实现的。
{"title":"Chennai Water Resource Management Using GIS","authors":"Saral Purohit, Gadhiya Jay Dipakbhai, G. Abirami","doi":"10.3233/apc210220","DOIUrl":"https://doi.org/10.3233/apc210220","url":null,"abstract":"Water scarcity is one of the biggest problems in the country of India, this problem is often caused by poor water resource management. Notably in India, the city of Chennai has had a water crisis going on for the past few years. On June 19th, 2019, the city officials declared that the city had run out of water. This was termed as ‘Day Zero’ where there was no water left. Most of the lakes of Chennai dried out. Poor water management and very less rainfall were the major reasons for this scarcity. Water resource management thus is of critical importance to ensure that water is utilized in the right way. So the aim of the proposed system is to evaluate the nature, significance, and rate of change in the water bodies of Chennai over a period of time using GIS/Remote sensing and assess the past and present conditions of water bodies in Chennai and to understand the dynamics and trends of change through various forms of spatial analysis. This is achieved by using different functionalities of ArcGIS and ArcMap and then analysing the obtained data and maps.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Customer Analysis Using Machine Learning Algorithms: A Case Study Using Banking Consumer Dataset 使用机器学习算法的客户分析:使用银行消费者数据集的案例研究
Pub Date : 2021-12-01 DOI: 10.3233/apc210263
R. Siva Subramanian, D. Prabha, B. Maheswari, J. Aswini
The aim of each enterprise is to achieve high revenue from the business and to stay in a high position from their competitors. To archive high revenue and high position from competitors the need of understanding the business consumers is a crucial one. However the firm business is completely dependent on the consumers the efficient analysis of consumers within the enterprises makes to achieve the business to high position. To perform effective consumer analysis, in this study different machine learning is studied and experimented. ML classifiers make to understand in-depth analysis about the consumer data and further enables to plan wise decision strategies to enhance the business revenue and consumer satisfaction intelligently. The use of different ML classifiers is to sort out how the customer prediction outcome changes accordingly to the ML classifier is applied. This makes to find the best ML classifier for the consumer dataset applied in this study. The experimental procedure is performed using different ML classifiers and the outcome achieved is captured and projected using various validity scores. This work applies different ML classifiers like K-NN, C4.5, Random Forest, Random Tree, LR, MLP and NB for customer analysis. The empirical results illustrate the C4.5 model achieves better accuracy prediction compare to other ML classifiers and also compared with the time complexity NB model works efficiently with running time.
每个企业的目标都是从业务中获得高收入,并在竞争对手中保持较高的地位。为了从竞争对手那里获得高收入和高地位,了解业务消费者的需求是至关重要的。然而,企业的经营完全依赖于消费者,对企业内部消费者的有效分析使得企业达到了较高的地位。为了进行有效的消费者分析,本研究对不同的机器学习进行了研究和实验。机器学习分类器可以对消费者数据进行深入的分析,并进一步制定明智的决策策略,从而智能地提高业务收入和消费者满意度。使用不同的ML分类器是为了整理客户预测结果如何随ML分类器的应用而变化。这使得为本研究中应用的消费者数据集找到最好的ML分类器。使用不同的ML分类器执行实验过程,并使用各种有效性分数捕获和预测所获得的结果。这项工作应用了不同的机器学习分类器,如K-NN、C4.5、随机森林、随机树、LR、MLP和NB进行客户分析。实验结果表明,与其他ML分类器相比,C4.5模型具有更好的准确率预测效果,并且与时间复杂度相比,NB模型在运行时间上具有更高的效率。
{"title":"Customer Analysis Using Machine Learning Algorithms: A Case Study Using Banking Consumer Dataset","authors":"R. Siva Subramanian, D. Prabha, B. Maheswari, J. Aswini","doi":"10.3233/apc210263","DOIUrl":"https://doi.org/10.3233/apc210263","url":null,"abstract":"The aim of each enterprise is to achieve high revenue from the business and to stay in a high position from their competitors. To archive high revenue and high position from competitors the need of understanding the business consumers is a crucial one. However the firm business is completely dependent on the consumers the efficient analysis of consumers within the enterprises makes to achieve the business to high position. To perform effective consumer analysis, in this study different machine learning is studied and experimented. ML classifiers make to understand in-depth analysis about the consumer data and further enables to plan wise decision strategies to enhance the business revenue and consumer satisfaction intelligently. The use of different ML classifiers is to sort out how the customer prediction outcome changes accordingly to the ML classifier is applied. This makes to find the best ML classifier for the consumer dataset applied in this study. The experimental procedure is performed using different ML classifiers and the outcome achieved is captured and projected using various validity scores. This work applies different ML classifiers like K-NN, C4.5, Random Forest, Random Tree, LR, MLP and NB for customer analysis. The empirical results illustrate the C4.5 model achieves better accuracy prediction compare to other ML classifiers and also compared with the time complexity NB model works efficiently with running time.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121634962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Recent Trends in Intensive Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1