首页 > 最新文献

2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)最新文献

英文 中文
Comparative Analysis of BERT-base Transformers and Deep Learning Sentiment Prediction Models 基于bert的变压器和深度学习情感预测模型的比较分析
Anandan Chinnalagu, A. Durairaj
The state-of-the-art Bidirectional Encoder Representations from Transformers (BERT) and Deep Learning (DL) models are used for Natural Language Processing (NLP) applications. Social media marketing and customers positive sentiments play major role for many online businesses.It is a crucial task for companies to predict customers sentiment based on context from online reviews. Predicting accurate sentiment is a time-consuming and challenging task due to high volume of unstructured customers review dataset. There are many previous experimental results reveals the performance and inaccuracy issues on large scale customer reviews datasets. This paper presents the comparative analysis of experimental research work on BERT, Hybrid fastText-BILSTM, and fastText Trigram models overcome more accurate sentiment prediction challenges. We propose fine-tuned BERT and Hybrid fastText-BILSTM models for large customer review datasets. This comparative analysis results show that the proposed fine-tuned BERT model performs better compare to other DL models in terms of accuracy and other performance measures.
来自变形金刚(BERT)和深度学习(DL)模型的最先进的双向编码器表示用于自然语言处理(NLP)应用。社交媒体营销和客户的积极情绪对许多在线企业起着重要作用。对于企业来说,根据在线评论的上下文来预测客户的情绪是一项至关重要的任务。由于大量的非结构化客户评论数据集,预测准确的情绪是一项耗时且具有挑战性的任务。大量的实验结果揭示了大规模客户评论数据集的性能和不准确性问题。本文对BERT、Hybrid fastText- bilstm和fastText Trigram模型的实验研究工作进行了比较分析,这些模型克服了更准确的情感预测挑战。我们为大型客户评论数据集提出了微调BERT和混合fastText-BILSTM模型。对比分析结果表明,与其他深度学习模型相比,所提出的微调BERT模型在精度和其他性能指标方面表现更好。
{"title":"Comparative Analysis of BERT-base Transformers and Deep Learning Sentiment Prediction Models","authors":"Anandan Chinnalagu, A. Durairaj","doi":"10.1109/SMART55829.2022.10047651","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047651","url":null,"abstract":"The state-of-the-art Bidirectional Encoder Representations from Transformers (BERT) and Deep Learning (DL) models are used for Natural Language Processing (NLP) applications. Social media marketing and customers positive sentiments play major role for many online businesses.It is a crucial task for companies to predict customers sentiment based on context from online reviews. Predicting accurate sentiment is a time-consuming and challenging task due to high volume of unstructured customers review dataset. There are many previous experimental results reveals the performance and inaccuracy issues on large scale customer reviews datasets. This paper presents the comparative analysis of experimental research work on BERT, Hybrid fastText-BILSTM, and fastText Trigram models overcome more accurate sentiment prediction challenges. We propose fine-tuned BERT and Hybrid fastText-BILSTM models for large customer review datasets. This comparative analysis results show that the proposed fine-tuned BERT model performs better compare to other DL models in terms of accuracy and other performance measures.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Implementation in Financial Sector and Cyber Security System 区块链在金融领域的应用和网络安全体系
Jeidy Panduro-Ramirez, Ashvine Kumar Sharma, Gurpreet Singh, Kumari H. Pavana, Claudia Poma-Garcia, Surendra Kumar Shukla
Blockchain is a decentralized log which is used to conduct business and anonymously trade virtual money. To verify a business request, every connected network member receives access to the most updated version of the protected ledger. The network ledger is a database of all previously completed Cryptocurrency payments. In essence, it's a type of database that keeps track of ever-expanding vandal standard data chunks that include batch of actual accounts. A sequential and temporal sequence is maintained when the finished blocks are introduced. Each block has a stamp and also an info link that refers to the block before it. Every user may join to the mentoring, permit Bitcoin system and transmit fresh transactions to validate and add new blocks. In a 2008 research article that was uploaded to a cryptographic newsgroup, Nakamoto provided architectural features for the Bit virtual currency. Nakamoto's idea provided cryptologists with a long-needed solution and created the groundwork for digital currency. This essay describes Bitcoin's operation as well as its idea, traits, and need. It aims to emphasize the influence of cryptocurrency on the growth of the Internet of Everything (I), financial firms, and banks in the past).
区块链是一种分散的日志,用于开展业务和匿名交易虚拟货币。为了验证业务请求,每个连接的网络成员都可以访问受保护分类账的最新版本。网络分类账是所有先前完成的加密货币支付的数据库。从本质上讲,它是一种数据库,可以跟踪不断扩展的破坏标准数据块,其中包括一批实际帐户。当完成的块被引入时,保持一个顺序和时间序列。每个块都有一个戳记和一个指向它之前的块的信息链接。每个用户都可以加入辅导,允许比特币系统并传输新的交易来验证和添加新的区块。在2008年上传到加密新闻组的一篇研究文章中,中本聪提供了比特虚拟货币的架构特征。中本聪的想法为密码学家提供了一个长期需要的解决方案,并为数字货币奠定了基础。这篇文章描述了比特币的运作,以及它的理念、特征和需求。它旨在强调加密货币对万物互联(Internet of Everything)、金融公司和过去的银行增长的影响。
{"title":"Blockchain Implementation in Financial Sector and Cyber Security System","authors":"Jeidy Panduro-Ramirez, Ashvine Kumar Sharma, Gurpreet Singh, Kumari H. Pavana, Claudia Poma-Garcia, Surendra Kumar Shukla","doi":"10.1109/SMART55829.2022.10047779","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047779","url":null,"abstract":"Blockchain is a decentralized log which is used to conduct business and anonymously trade virtual money. To verify a business request, every connected network member receives access to the most updated version of the protected ledger. The network ledger is a database of all previously completed Cryptocurrency payments. In essence, it's a type of database that keeps track of ever-expanding vandal standard data chunks that include batch of actual accounts. A sequential and temporal sequence is maintained when the finished blocks are introduced. Each block has a stamp and also an info link that refers to the block before it. Every user may join to the mentoring, permit Bitcoin system and transmit fresh transactions to validate and add new blocks. In a 2008 research article that was uploaded to a cryptographic newsgroup, Nakamoto provided architectural features for the Bit virtual currency. Nakamoto's idea provided cryptologists with a long-needed solution and created the groundwork for digital currency. This essay describes Bitcoin's operation as well as its idea, traits, and need. It aims to emphasize the influence of cryptocurrency on the growth of the Internet of Everything (I), financial firms, and banks in the past).","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115650962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using CNN and Open CV, Mood Identification with Face Feature Learning 基于CNN和Open CV的情绪识别与人脸特征学习
Hem Lata Sharma, Meenakshi Sharma
Investigation on sentimental analysis via face image identification is ongoing in the domain of human-computer interaction (HCI). With their body language and facial expressions individuals are able to communicate a wide range of feelings and experiences. In this assignment, we will use a method that enables the machine to identify individual the facial identification of human feelings with the aid of Convolution Neural Network (CNN) and OpenCV in order to recognise the real feelings from the person's face gesture. Emotion Recognition is ultimately a synthesis of data gathered from many patterns. The barrier among humans and technology will be closed if computers are able to comprehend more human emotions. In this study article, we'll show how to read a person's frontal facial expression to accurately identify emotions including neutrality, pleased, unhappy, surprised, furious, frightened, and contempt.
在人机交互(HCI)领域,基于人脸图像识别的情感分析研究正在进行中。通过他们的肢体语言和面部表情,人们能够交流各种各样的感受和经历。在这个作业中,我们将使用一种方法,使机器能够识别个人的面部识别人类的感觉借助卷积神经网络(CNN)和OpenCV,以识别真实的感觉从人的面部手势。情感识别最终是从许多模式中收集的数据的综合。如果计算机能够理解更多的人类情感,人类和技术之间的障碍将被关闭。在这篇研究文章中,我们将展示如何阅读一个人的正面面部表情,以准确地识别情绪,包括中性、高兴、不高兴、惊讶、愤怒、害怕和蔑视。
{"title":"Using CNN and Open CV, Mood Identification with Face Feature Learning","authors":"Hem Lata Sharma, Meenakshi Sharma","doi":"10.1109/SMART55829.2022.10047674","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047674","url":null,"abstract":"Investigation on sentimental analysis via face image identification is ongoing in the domain of human-computer interaction (HCI). With their body language and facial expressions individuals are able to communicate a wide range of feelings and experiences. In this assignment, we will use a method that enables the machine to identify individual the facial identification of human feelings with the aid of Convolution Neural Network (CNN) and OpenCV in order to recognise the real feelings from the person's face gesture. Emotion Recognition is ultimately a synthesis of data gathered from many patterns. The barrier among humans and technology will be closed if computers are able to comprehend more human emotions. In this study article, we'll show how to read a person's frontal facial expression to accurately identify emotions including neutrality, pleased, unhappy, surprised, furious, frightened, and contempt.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121830529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Code Injection Assault & Mitigation Model to Prevent Attacks 防止攻击的代码注入攻击和缓解模型
Shalom Akhai, Vincent Balu
The majority of businesses now want to conduct their operations online, and web applications are one of the most popular targets for web application assaults, which are quickly emerging as the biggest security risk facing modern businesses. Denial of services (DOS), malware, and brute force assaults, for instance, are the most frequent cyberattacks on web applications nowadays. Basically, Exploit is a flaw on the web that enables attackers to manipulate the queries that a website relies on. An attacker may actually read, remove, add, and retrieve the stored data with the use of these queries.
现在,大多数企业都希望在网上开展业务,而web应用程序是web应用程序攻击的最受欢迎的目标之一,而web应用程序攻击正迅速成为现代企业面临的最大安全风险。例如,拒绝服务(DOS)、恶意软件和暴力攻击是当今对web应用程序最常见的网络攻击。基本上,Exploit是网络上的一个漏洞,使攻击者能够操纵网站所依赖的查询。攻击者实际上可以使用这些查询读取、删除、添加和检索存储的数据。
{"title":"Code Injection Assault & Mitigation Model to Prevent Attacks","authors":"Shalom Akhai, Vincent Balu","doi":"10.1109/SMART55829.2022.10046835","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046835","url":null,"abstract":"The majority of businesses now want to conduct their operations online, and web applications are one of the most popular targets for web application assaults, which are quickly emerging as the biggest security risk facing modern businesses. Denial of services (DOS), malware, and brute force assaults, for instance, are the most frequent cyberattacks on web applications nowadays. Basically, Exploit is a flaw on the web that enables attackers to manipulate the queries that a website relies on. An attacker may actually read, remove, add, and retrieve the stored data with the use of these queries.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127241513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the Role of Block Chain to Secure Identity in IoT for Industrial Automation 研究区块链在工业自动化物联网安全身份中的作用
Dipesh Uike, Sandeep Agarwalla, V. Bansal, M. Chakravarthi, Rajesh Singh, Prabhdeep Singh
The information is accessible to everyone using a block chain-capable app. Each single set of information that comes has its own block. When a blocks is loaded with information and linked to the block before it, a historic path for data are generated. The openness and virtual moral purity of IoT technologies shield smart devices from cyber-attacks. The brick chain's ability to store data in events and validate these activities with node may be utilized to provide secure connection amongst Connected systems. Automation has advanced due to the Internet of Things (IOT). By using block chain, we can increase the safety and confidentiality. This paper's focus is on the architecture and functionality of blockchain-based IoT technologies for industrial automation. Along with the Blockchain's numerous characteristics, its benefits are being investigated. The use cases and blockchain appropriateness studies for secure industrial automation have also been performed. In the last section, We examine the security components of the blockchain for a comparative analysis in both Man-in-the-middle and denial-of-service attack scenarios.
每个人都可以使用具有区块链功能的应用程序访问这些信息。每一组信息都有自己的区块。当一个块加载信息并链接到它之前的块时,生成数据的历史路径。物联网技术的开放性和虚拟道德纯洁性使智能设备免受网络攻击。砖链在事件中存储数据并通过节点验证这些活动的能力可以用于在连接的系统之间提供安全连接。由于物联网(IOT),自动化得到了发展。通过使用区块链,我们可以提高安全性和保密性。本文的重点是基于区块链的工业自动化物联网技术的架构和功能。随着区块链的众多特点,它的好处正在被调查。还对安全工业自动化的用例和区块链适当性进行了研究。在最后一节中,我们将研究区块链的安全组件,以便在中间人攻击和拒绝服务攻击场景下进行比较分析。
{"title":"Investigating the Role of Block Chain to Secure Identity in IoT for Industrial Automation","authors":"Dipesh Uike, Sandeep Agarwalla, V. Bansal, M. Chakravarthi, Rajesh Singh, Prabhdeep Singh","doi":"10.1109/SMART55829.2022.10047385","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047385","url":null,"abstract":"The information is accessible to everyone using a block chain-capable app. Each single set of information that comes has its own block. When a blocks is loaded with information and linked to the block before it, a historic path for data are generated. The openness and virtual moral purity of IoT technologies shield smart devices from cyber-attacks. The brick chain's ability to store data in events and validate these activities with node may be utilized to provide secure connection amongst Connected systems. Automation has advanced due to the Internet of Things (IOT). By using block chain, we can increase the safety and confidentiality. This paper's focus is on the architecture and functionality of blockchain-based IoT technologies for industrial automation. Along with the Blockchain's numerous characteristics, its benefits are being investigated. The use cases and blockchain appropriateness studies for secure industrial automation have also been performed. In the last section, We examine the security components of the blockchain for a comparative analysis in both Man-in-the-middle and denial-of-service attack scenarios.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127480803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review Mostly on Identification of Early Tamil Extracts Actors Through Historical Writing 早期泰米尔语摘录演员的历史书写鉴定述评
Anand Shukla, Vijender Kumar Solanki
Any technique that uses Extracts inscriptions and historical writing to identify characters translates into the modern Tamil text encoding. One of most difficult parts is identifying the oldest Tamil symbols. It is more hard to identify the symbols if the lettering are now on the surfaces. In texts written in English or other tongues, text detection has almost perfected itself. Owing to their existence from the third millennium B.c.e. to the fourth century CE, ancient sanskrit symbols in medieval manuscripts are exceedingly hard to ascertain. First, the vowels resemble phonetic vowel symbols; next, the publisher doesn't quite accurately transcribe the Extracts no.19; and third, the font are transcribed using various genres and stroked. As a result, the average accuracy in Written in sanskrit letters is not high. If this continues, the next population won't be able to identify the vital information our ancestors provided. Only one small number of individuals are recognized to have historic characteristics. In these seismic surveys, we evaluate several 'll look using tables.
任何使用提取铭文和历史文字来识别字符的技术都可以翻译成现代泰米尔文本编码。最困难的部分之一是识别最古老的泰米尔符号。如果字母现在在表面上,就更难识别这些符号了。在用英语或其他语言写的文本中,文本检测几乎已经完善了自己。由于中世纪手稿中的古梵语符号存在于公元前三千年至公元四世纪,因此很难确定。首先,元音与语音元音符号相似;其次,出版商没有很准确地抄写第19号摘录;第三,字体是用不同的体裁和笔画誊写的。因此,用梵语字母书写的平均准确率不高。如果这种情况继续下去,下一代人将无法识别我们祖先提供的重要信息。只有一小部分个体被认为具有历史特征。在这些地震调查中,我们用表格评估了几个井眼。
{"title":"A Review Mostly on Identification of Early Tamil Extracts Actors Through Historical Writing","authors":"Anand Shukla, Vijender Kumar Solanki","doi":"10.1109/SMART55829.2022.10047090","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047090","url":null,"abstract":"Any technique that uses Extracts inscriptions and historical writing to identify characters translates into the modern Tamil text encoding. One of most difficult parts is identifying the oldest Tamil symbols. It is more hard to identify the symbols if the lettering are now on the surfaces. In texts written in English or other tongues, text detection has almost perfected itself. Owing to their existence from the third millennium B.c.e. to the fourth century CE, ancient sanskrit symbols in medieval manuscripts are exceedingly hard to ascertain. First, the vowels resemble phonetic vowel symbols; next, the publisher doesn't quite accurately transcribe the Extracts no.19; and third, the font are transcribed using various genres and stroked. As a result, the average accuracy in Written in sanskrit letters is not high. If this continues, the next population won't be able to identify the vital information our ancestors provided. Only one small number of individuals are recognized to have historic characteristics. In these seismic surveys, we evaluate several 'll look using tables.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125921707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Methods of Industrial Automation System in Manufacturing and Control Sector using Joystick with and Robotic Technology 基于操纵杆和机器人技术的制造和控制领域工业自动化系统的机器学习方法
Sajithunisa Hussain, Remya P George, Nazia Ahmad, R. Jahan
The automation in the industrial sector plays a revolutionary change in the advancement in industries with improved communication network. The manufacturing and control sectors are enabled with complete automation to adopt higher productivity. Thus the demand of the consumers are highly accomplished through the automation in the industrial sectors. This automation is established by using joystick and robotic technology with sensors. The industrial joystick is used as a control devices for operating the machines at varied size with appropriate directions. The application of robotics in the industry is versatile in nature. The robotic arm is functioned through controlling the joystick. The overall movement of the robot is controlled and functioned with the joystick. It helps to reduce several minute errors with improved accuracy. This automation in the industry helps to enhance newer innovations with real time implementation.
随着通信网络的完善,工业领域的自动化对工业的发展起着革命性的变化。制造和控制部门实现了完全自动化,以采用更高的生产率。因此,通过工业部门的自动化,消费者的需求得到了高度的满足。这种自动化是通过使用操纵杆和带有传感器的机器人技术来建立的。工业摇杆是一种控制装置,用于在适当的方向上操作不同尺寸的机器。机器人在工业上的应用本质上是多用途的。机械臂是通过控制操纵杆来工作的。机器人的整体运动是由操纵杆控制的。它有助于减少几分钟的误差,提高精度。行业中的这种自动化有助于通过实时实现来增强更新的创新。
{"title":"Machine Learning Methods of Industrial Automation System in Manufacturing and Control Sector using Joystick with and Robotic Technology","authors":"Sajithunisa Hussain, Remya P George, Nazia Ahmad, R. Jahan","doi":"10.1109/SMART55829.2022.10047023","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047023","url":null,"abstract":"The automation in the industrial sector plays a revolutionary change in the advancement in industries with improved communication network. The manufacturing and control sectors are enabled with complete automation to adopt higher productivity. Thus the demand of the consumers are highly accomplished through the automation in the industrial sectors. This automation is established by using joystick and robotic technology with sensors. The industrial joystick is used as a control devices for operating the machines at varied size with appropriate directions. The application of robotics in the industry is versatile in nature. The robotic arm is functioned through controlling the joystick. The overall movement of the robot is controlled and functioned with the joystick. It helps to reduce several minute errors with improved accuracy. This automation in the industry helps to enhance newer innovations with real time implementation.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122690692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Emerging Role of the Knowledge Driven Applications of Wireless Networks for Next Generation Online Stream Processing 下一代在线流处理中无线网络知识驱动应用的新角色
V. Gunturu, P. Kumari, S. Chithra, Bhargabjyoti Saikia, Rajesh Singh, D. P. Singh
The present article discusses the use of stream processing to gather data from large-scale WIFI networks. Along with the foundational techniques for deliberate sampling, data collecting, likewise network monitoring in wireless networks, we also examine how understanding extraction may be viewed as an ML problem for applications for large-scale data streaming. We highlight the major This article discusses advancements in large data stream processing methods. We also look more closely at the database collection, edge detection, and methods for machine learning that may be used in the context of WIFI analytics. We discuss challenges, academic research, and the results of wireless network monitoring and stream analysis. Further research is anticipated into other dataflow improvements, such as pattern recognition and optimization algorithms.
本文讨论了使用流处理从大规模WIFI网络收集数据。除了有意采样、数据收集和无线网络监控的基本技术外,我们还研究了如何将理解提取视为大规模数据流应用的ML问题。本文讨论了大数据流处理方法的进展。我们还会更密切地关注数据库收集、边缘检测和机器学习方法,这些方法可能会在WIFI分析中使用。我们讨论挑战,学术研究,以及无线网络监测和流分析的结果。预计将进一步研究其他数据流改进,如模式识别和优化算法。
{"title":"The Emerging Role of the Knowledge Driven Applications of Wireless Networks for Next Generation Online Stream Processing","authors":"V. Gunturu, P. Kumari, S. Chithra, Bhargabjyoti Saikia, Rajesh Singh, D. P. Singh","doi":"10.1109/SMART55829.2022.10047114","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047114","url":null,"abstract":"The present article discusses the use of stream processing to gather data from large-scale WIFI networks. Along with the foundational techniques for deliberate sampling, data collecting, likewise network monitoring in wireless networks, we also examine how understanding extraction may be viewed as an ML problem for applications for large-scale data streaming. We highlight the major This article discusses advancements in large data stream processing methods. We also look more closely at the database collection, edge detection, and methods for machine learning that may be used in the context of WIFI analytics. We discuss challenges, academic research, and the results of wireless network monitoring and stream analysis. Further research is anticipated into other dataflow improvements, such as pattern recognition and optimization algorithms.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Super Six - Axis Cord Influenced Linear Laser for Personal Flower Management in Cultivation with Live Control Systems is Connected to The Robot Manipulator 超六轴线束影响线性激光实时控制系统与机器人机械手连接
B. E. Narasimhayya, S. B. Vinay Kumar
In today's agribusiness, using robotics, machine learning, and also the web of things has become standard practise. The agricultural business is being forced to embrace such new methods in order to address issues like massive unemployment, rising food consumption with declining quality farmland, efficiency per square land, and deteriorating food quality due to global warming. As a result of the aforementioned difficulties and the world's increasing population, research and innovation in agricultural technology have become more crucial nowadays. In this document, we suggest an AI-powered wire automaton with six levels of autonomy and an omega automaton with degrees of opportunity that can help with agricultural tasks like sorting, pest management, picking strawberries and flowers, fertiliser application, and tracking of plant development, NPK tiers, and soil moisture. The robotic is called Farmbot. The Based criteria may communicate crop information to distant servers where it can be processed and retrieved to get further insight into soil quality. It can also be managed and watched remotely by a home computer or via a mobile internet software. The Farmbot may be programmed to do routine tasks including continuous monitoring, collecting fruit, cleaning, applying fertiliser, and gathering information about each plant. The Farmbot has direct exposure to just about any area of the field thanks to its placement over a moveable four wheels bot. This Farmbot's goal is mainly on providing individualised plant maintenance and aiding producers in raising output. As a design illustration of a functioning version for the imagined Farmbot, a 3D depiction is shown. The simulation's outcomes are shown.
在今天的农业综合企业中,使用机器人、机器学习和物联网已经成为标准做法。农业企业正被迫接受这些新方法,以解决诸如大规模失业、粮食消费增加而农田质量下降、每平方土地效率下降以及全球变暖导致的食品质量恶化等问题。由于上述困难和世界人口的增加,农业技术的研究和创新在今天变得更加重要。在本文中,我们提出了一种具有6级自主性的人工智能驱动的电线自动机和一种具有不同机会度的omega自动机,可以帮助完成农业任务,如分拣、害虫管理、采摘草莓和鲜花、施肥、跟踪植物发育、氮磷钾层和土壤湿度。这个机器人被称为Farmbot。基于的标准可以将作物信息传输到远程服务器,在那里可以对其进行处理和检索,以进一步了解土壤质量。它也可以通过家用电脑或移动互联网软件远程管理和观看。“农场机器人”可以通过编程来完成日常任务,包括持续监测、采集水果、清洁、施肥和收集每株植物的信息。由于放置在一个可移动的四轮机器人上,Farmbot几乎可以直接暴露在田地的任何区域。这个农场机器人的目标主要是提供个性化的工厂维护和帮助生产者提高产量。作为想象中的农场机器人功能版本的设计插图,展示了3D描述。最后给出了仿真结果。
{"title":"Super Six - Axis Cord Influenced Linear Laser for Personal Flower Management in Cultivation with Live Control Systems is Connected to The Robot Manipulator","authors":"B. E. Narasimhayya, S. B. Vinay Kumar","doi":"10.1109/SMART55829.2022.10046682","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046682","url":null,"abstract":"In today's agribusiness, using robotics, machine learning, and also the web of things has become standard practise. The agricultural business is being forced to embrace such new methods in order to address issues like massive unemployment, rising food consumption with declining quality farmland, efficiency per square land, and deteriorating food quality due to global warming. As a result of the aforementioned difficulties and the world's increasing population, research and innovation in agricultural technology have become more crucial nowadays. In this document, we suggest an AI-powered wire automaton with six levels of autonomy and an omega automaton with degrees of opportunity that can help with agricultural tasks like sorting, pest management, picking strawberries and flowers, fertiliser application, and tracking of plant development, NPK tiers, and soil moisture. The robotic is called Farmbot. The Based criteria may communicate crop information to distant servers where it can be processed and retrieved to get further insight into soil quality. It can also be managed and watched remotely by a home computer or via a mobile internet software. The Farmbot may be programmed to do routine tasks including continuous monitoring, collecting fruit, cleaning, applying fertiliser, and gathering information about each plant. The Farmbot has direct exposure to just about any area of the field thanks to its placement over a moveable four wheels bot. This Farmbot's goal is mainly on providing individualised plant maintenance and aiding producers in raising output. As a design illustration of a functioning version for the imagined Farmbot, a 3D depiction is shown. The simulation's outcomes are shown.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Model to Identify Hide Images using CNN Algorithm 使用CNN算法识别隐藏图像的深度学习模型
R. Shukla, A. Sengar, Anurag Gupta, Nupa Ram Chauhar
In this paper, we are obtaining and solving the problem of face identification and verification including with mask and without mask face images. In this algorithm they model allows users to use the webcam, digital cameras and multimedia cameras for identify and detect several face related features in the faces. In this paper, we are conducting detailed and systematic result to verify the effectiveness of these classic feature learning systems on linear and nonlinear class imbalanced outcomes. We also demonstrate more discriminatory deep representation features can be learned through the implementation of a deep network model. This model is maintaining the margin of the both classes including clusters. With using Convolutional Neural Network (CNN), they are providing efficient result in with mask and without mask face image. They are providing good result in both offline and real time performance with predictable value of accuracy. They are done research in evaluations of being made for publicly available datasets like DEEPFace and with mask and without mask dataset. The proposed model is working best result in different-different face related datasets to identify with face mask and without face mask images.
在本文中,我们获得并解决了人脸识别与验证问题,包括带面具和不带面具的人脸图像。在这个算法中,他们的模型允许用户使用网络摄像头、数码相机和多媒体摄像头来识别和检测面部的几个面部相关特征。在本文中,我们进行了详细和系统的结果来验证这些经典特征学习系统对线性和非线性类不平衡结果的有效性。我们还证明了通过实现深度网络模型可以学习到更多具有歧视性的深度表征特征。这个模型保持了两类包括集群的边际。利用卷积神经网络(CNN)对带掩模和不带掩模的人脸图像进行了有效的处理。它们在离线和实时性能方面都提供了良好的结果,并且具有可预测的精度值。他们对公开可用的数据集(如DEEPFace)进行了评估,并对有面具和没有面具的数据集进行了评估。该模型在不同类型的人脸相关数据集上具有较好的识别效果。
{"title":"Deep Learning Model to Identify Hide Images using CNN Algorithm","authors":"R. Shukla, A. Sengar, Anurag Gupta, Nupa Ram Chauhar","doi":"10.1109/SMART55829.2022.10047661","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047661","url":null,"abstract":"In this paper, we are obtaining and solving the problem of face identification and verification including with mask and without mask face images. In this algorithm they model allows users to use the webcam, digital cameras and multimedia cameras for identify and detect several face related features in the faces. In this paper, we are conducting detailed and systematic result to verify the effectiveness of these classic feature learning systems on linear and nonlinear class imbalanced outcomes. We also demonstrate more discriminatory deep representation features can be learned through the implementation of a deep network model. This model is maintaining the margin of the both classes including clusters. With using Convolutional Neural Network (CNN), they are providing efficient result in with mask and without mask face image. They are providing good result in both offline and real time performance with predictable value of accuracy. They are done research in evaluations of being made for publicly available datasets like DEEPFace and with mask and without mask dataset. The proposed model is working best result in different-different face related datasets to identify with face mask and without face mask images.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1