首页 > 最新文献

2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)最新文献

英文 中文
A DNN is Programmed Prediction Scholarly Accomplishment 深度神经网络是程序化的预测学术成就
Mizan Ali Khan, H. Kaur
Predicting student behavior and achievement in the present educational system is becoming more challenging. If we are able to forecast student performance in the past, it will be easier for both students and their teachers to monitor their progress and activities. Nowadays, the continuous assessment approach has been implemented by several colleges all around the world. Such technologies are helpful to students in raising their grades and performance, as well as to instructors in assessing the pupils and concentrating on those who exhibit poor performance. This assessment system's primary purpose is to assist all normal students and teachers. Artificial Neural Networks (ANN) have recently seen widespread and successful implementations in a wide range of data mining methods and applications, and are frequently far superior to other classifiers, whether they be machine learning representations and others like training algorithm, stochastic gradient descent, or minibatch. In light of educational data mining, the purpose of this article is to determine if artificial neural networks (ANN) are an effective predictive classifier to forecast students' performance using a dataset from a learning system. On this dataset of LMS, we will evaluate the performance of neural networks to that of several other classifiers in order to assess their applicability. Support Vector Machine (SVM) is one of these classifiers.
在目前的教育制度下,预测学生的行为和成绩正变得越来越具有挑战性。如果我们能够预测学生过去的表现,学生和老师就更容易监控他们的进步和活动。目前,世界上已有多所高校采用了连续考核方法。这些技术有助于提高学生的成绩和表现,也有助于教师评估学生并集中精力关注表现不佳的学生。这个评估系统的主要目的是帮助所有的普通学生和教师。人工神经网络(ANN)最近在广泛的数据挖掘方法和应用中得到了广泛和成功的实现,并且通常远远优于其他分类器,无论是机器学习表示还是其他分类器,如训练算法、随机梯度下降或小批量。鉴于教育数据挖掘,本文的目的是确定人工神经网络(ANN)是否是一种有效的预测分类器,可以使用来自学习系统的数据集来预测学生的表现。在LMS的这个数据集上,我们将神经网络的性能与其他几种分类器的性能进行比较,以评估它们的适用性。支持向量机(SVM)就是其中一种分类器。
{"title":"A DNN is Programmed Prediction Scholarly Accomplishment","authors":"Mizan Ali Khan, H. Kaur","doi":"10.1109/SMART55829.2022.10047123","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047123","url":null,"abstract":"Predicting student behavior and achievement in the present educational system is becoming more challenging. If we are able to forecast student performance in the past, it will be easier for both students and their teachers to monitor their progress and activities. Nowadays, the continuous assessment approach has been implemented by several colleges all around the world. Such technologies are helpful to students in raising their grades and performance, as well as to instructors in assessing the pupils and concentrating on those who exhibit poor performance. This assessment system's primary purpose is to assist all normal students and teachers. Artificial Neural Networks (ANN) have recently seen widespread and successful implementations in a wide range of data mining methods and applications, and are frequently far superior to other classifiers, whether they be machine learning representations and others like training algorithm, stochastic gradient descent, or minibatch. In light of educational data mining, the purpose of this article is to determine if artificial neural networks (ANN) are an effective predictive classifier to forecast students' performance using a dataset from a learning system. On this dataset of LMS, we will evaluate the performance of neural networks to that of several other classifiers in order to assess their applicability. Support Vector Machine (SVM) is one of these classifiers.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133234637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph Database-Based Method for Network Log File Analysis 基于图数据库的网络日志文件分析方法
K. Sharma, Arvind Kumar
It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.
为了更准确地判断网络威胁的严重程度,经常需要评估从大量网络日志中获取的数据。这可以通过审查数据来完成。一个例子是在单独监禁中检查命令行工具产生的日志记录。尽管使用日志管理系统可以使识别某些日志文档变得更简单,但是为了确定不同类型的网络活动之间的连接而检查所有日志文档可能会很耗时。为了构建这些桥,我们可以利用关系数据库,例如,通过使用使用大量连接进程的复杂数据库查询来连接表。近年来,人们对使用图数据库作为一种存储和组织数据的方法,为语义搜索做准备的兴趣有所增加。
{"title":"A Graph Database-Based Method for Network Log File Analysis","authors":"K. Sharma, Arvind Kumar","doi":"10.1109/SMART55829.2022.10047250","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047250","url":null,"abstract":"It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Secure Architecture for Providing Data Authenticity in IoT Enabled Devices” “在物联网设备中提供数据真实性的安全架构”
Shivangi, Gulishta Khan, S. Ninoria
The Internet of Things (IoT) is a young technology that is rapidly evolving. because of importance of IoT within the destiny, it will be extremely important to create adequate security for IoT infrastructure. Via this existing article, the architecture of IoT and their security dimensions are addressed after presenting and exploring the securities and demanding scenarios of various IoT layers. The use of sensitive information that needs to be kept secret from third parties will increase as a result of the development of modern private technologies. In order to assess and mitigate many IoT privacy issues and support the design and deployment of cosy and touchy systems, present methodologies are neither sufficient nor powerful. This study suggests a data authentication architecture in this situation. In particular, there may be a drive toward adopting secure IoT architectures that rely on physically unreproducible capabilities and in-depth research to guarantee the privacy of retrieved IoT data.
物联网(IoT)是一项正在迅速发展的年轻技术。由于物联网在未来的重要性,为物联网基础设施创造足够的安全性将是非常重要的。通过这篇现有的文章,在展示和探索了物联网各层的安全性和需求场景之后,讨论了物联网的架构及其安全维度。由于现代私人技术的发展,需要对第三方保密的敏感信息的使用将会增加。为了评估和缓解许多物联网隐私问题,并支持舒适和敏感系统的设计和部署,目前的方法既不充分也不强大。本研究提出了一种适用于这种情况的数据身份验证体系结构。特别是,可能会有一种采用安全物联网架构的动力,这种架构依赖于物理上不可复制的功能和深入的研究来保证检索物联网数据的隐私。
{"title":"“Secure Architecture for Providing Data Authenticity in IoT Enabled Devices”","authors":"Shivangi, Gulishta Khan, S. Ninoria","doi":"10.1109/SMART55829.2022.10047067","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047067","url":null,"abstract":"The Internet of Things (IoT) is a young technology that is rapidly evolving. because of importance of IoT within the destiny, it will be extremely important to create adequate security for IoT infrastructure. Via this existing article, the architecture of IoT and their security dimensions are addressed after presenting and exploring the securities and demanding scenarios of various IoT layers. The use of sensitive information that needs to be kept secret from third parties will increase as a result of the development of modern private technologies. In order to assess and mitigate many IoT privacy issues and support the design and deployment of cosy and touchy systems, present methodologies are neither sufficient nor powerful. This study suggests a data authentication architecture in this situation. In particular, there may be a drive toward adopting secure IoT architectures that rely on physically unreproducible capabilities and in-depth research to guarantee the privacy of retrieved IoT data.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Machine Learning for Industry 5.0 Efficiency Prediction Based on Security and Proposing Models to Enhance Efficiency 基于安全性的工业5.0效率预测中使用机器学习并提出模型以提高效率
P. Pant, A. Rajawat, S. B. Goyal, Deepmala Singh, Neagu Bogdan Constantin, M. Răboacă, C. Verma
Machine learning, with its huge untapped potential, is being researched all over the world to develop truly intelligent systems. Its applications are not enclosed in just one domain but in almost everything, from prediction models, recommender systems, and anomaly detection to automation and teaching a computer how to fly a helicopter. In this research, Multivariate Linear regression of supervised machine learning is studied to predict the efficiency of Industry 5.0, however, the efficiency of the model would be dependent on many factors and components such as security protocols and models, Industrial IoT - performance, connectivity, reachability, availability and many more. These factors and components would be categorized as the features of the algorithm which would be assigned weight ‘w’ and bias ‘b’. To improve the efficiency of the model, these components could be changed and updated in order to enhance the overall model. Previous research papers discussed the integration of “hot” technologies like 5G, Blockchain, AI, and IIoT in the industry 5.0 model, but this research is presented as their future work as it proposes to determine the efficiency of the model based on the features provided so that ultimate and optimal model could be determined. Later it proposes security and IIoT models that could improve the overall Industry 5.0. Quorum blockchain is proposed by the research in order to implement the ultimate security in the Industry 5.0.
机器学习具有巨大的未开发潜力,世界各地都在研究它,以开发真正的智能系统。它的应用并不局限于一个领域,而是几乎在所有领域,从预测模型、推荐系统、异常检测到自动化和教计算机如何驾驶直升机。在本研究中,研究了监督机器学习的多元线性回归来预测工业5.0的效率,然而,模型的效率将取决于许多因素和组件,如安全协议和模型,工业物联网性能,连接性,可达性,可用性等等。这些因素和组成部分将被归类为算法的特征,这些特征将被分配权重' w '和偏差' b '。为了提高模型的效率,可以对这些组件进行更改和更新,以增强整体模型。之前的研究论文讨论了5G、区块链、AI、IIoT等“热门”技术在工业5.0模型中的集成,但本研究是他们未来的工作,提出根据所提供的特征来确定模型的效率,从而确定最终和最优的模型。随后,它提出了可以改善整体工业5.0的安全和工业物联网模型。为了实现工业5.0的终极安全,本研究提出了仲裁区块链。
{"title":"Using Machine Learning for Industry 5.0 Efficiency Prediction Based on Security and Proposing Models to Enhance Efficiency","authors":"P. Pant, A. Rajawat, S. B. Goyal, Deepmala Singh, Neagu Bogdan Constantin, M. Răboacă, C. Verma","doi":"10.1109/SMART55829.2022.10047387","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047387","url":null,"abstract":"Machine learning, with its huge untapped potential, is being researched all over the world to develop truly intelligent systems. Its applications are not enclosed in just one domain but in almost everything, from prediction models, recommender systems, and anomaly detection to automation and teaching a computer how to fly a helicopter. In this research, Multivariate Linear regression of supervised machine learning is studied to predict the efficiency of Industry 5.0, however, the efficiency of the model would be dependent on many factors and components such as security protocols and models, Industrial IoT - performance, connectivity, reachability, availability and many more. These factors and components would be categorized as the features of the algorithm which would be assigned weight ‘w’ and bias ‘b’. To improve the efficiency of the model, these components could be changed and updated in order to enhance the overall model. Previous research papers discussed the integration of “hot” technologies like 5G, Blockchain, AI, and IIoT in the industry 5.0 model, but this research is presented as their future work as it proposes to determine the efficiency of the model based on the features provided so that ultimate and optimal model could be determined. Later it proposes security and IIoT models that could improve the overall Industry 5.0. Quorum blockchain is proposed by the research in order to implement the ultimate security in the Industry 5.0.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advanced IoT Home Automation using ThingSpeak and Google Assistant IoT Platform 使用ThingSpeak和Google Assistant物联网平台的高级物联网家庭自动化
P. Tyagi, Rajesh Singh, M. Kalyan Chakravarthi, Prabhdeep Singh, A. P., Ch. Raghava Prasad
The Ict (IoT) is a significant system that connects numerous items to the network and network communications. It enables links between individuals and things in almost any manner from any point at any time. Numerous IoT-based options exist. Home security system are some of the most well-liked applications that have raised the quality of people's lives. In this work, we offer an advanced processing concept that has been intuitive and can be used to buy and run household products from any part of the globe. This gadget is smart and focused in commanding other devices with speech processing and understanding. Therefore, the primary goal of the work is to create a sophisticated control system that is far more stable and intelligent enough to get out gas and human effort. Detector, thermistor, MQ2 gyroscope, or GPS module are the major four devices shown in this system. This female's embedded systems are all affordable, available, and interchangeable.
信息通信技术(IoT)是将众多物品连接到网络和网络通信的重要系统。它可以在任何时间、任何地点以几乎任何方式连接个人和事物。存在许多基于物联网的选择。家庭安全系统是提高人们生活质量的最受欢迎的应用程序之一。在这项工作中,我们提供了一种直观的先进处理概念,可用于从全球任何地方购买和运行家用产品。这个小工具很聪明,专注于通过语音处理和理解来指挥其他设备。因此,这项工作的主要目标是创建一个复杂的控制系统,该系统更加稳定和智能,足以排除气体和人力。探测器、热敏电阻、MQ2陀螺仪、GPS模块是该系统的四个主要器件。这位女士的嵌入式系统都是负担得起的,可用的,可互换的。
{"title":"Advanced IoT Home Automation using ThingSpeak and Google Assistant IoT Platform","authors":"P. Tyagi, Rajesh Singh, M. Kalyan Chakravarthi, Prabhdeep Singh, A. P., Ch. Raghava Prasad","doi":"10.1109/SMART55829.2022.10047017","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047017","url":null,"abstract":"The Ict (IoT) is a significant system that connects numerous items to the network and network communications. It enables links between individuals and things in almost any manner from any point at any time. Numerous IoT-based options exist. Home security system are some of the most well-liked applications that have raised the quality of people's lives. In this work, we offer an advanced processing concept that has been intuitive and can be used to buy and run household products from any part of the globe. This gadget is smart and focused in commanding other devices with speech processing and understanding. Therefore, the primary goal of the work is to create a sophisticated control system that is far more stable and intelligent enough to get out gas and human effort. Detector, thermistor, MQ2 gyroscope, or GPS module are the major four devices shown in this system. This female's embedded systems are all affordable, available, and interchangeable.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"786 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113995420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intensive Analysis of Recent Trends of Block Chain Technology in the Role of Development in the Healthcare Sector 区块链技术在医疗保健行业发展中的作用的最新趋势的深入分析
Merin Thomas, V. Karunakaran
The efficacy of the block chain will be examined in this report to provide more context. Here, the synchronisation of records' information depending on several treatment layers will be shown. This study tries to give succinct overview of the block chain and how it influences an extensive literature assessment on the subject. To apply a fundamental concept of block - chain, pros and cons of block chain technology in the healthcare field will be shown. Utilizing block chain technology, many problems in medical groups may be avoided by comprehending incorporated components. We have seen quality standards processes in the healthcare industry as a result of block chain technology. The literature component of it will outline the whole healthcare and its operations. It may be concluded that block chain technology is seen as a realistic objective in the medical field by performing a thorough evaluation of publications and magazines that have undergone evaluation. Some of the biggest goals for blockchain in the health care field are reportedly accountability and accountability. This essay will provide priceless insights on the subject that will alter how people see block chain technology. in general. The apparent originality of this subject will be discussed for further evaluation, which will link readers to helpful sources. This study will demonstrate how health care workers may look at many facets of information infrastructure based on block chains. For the purpose of supporting the methodology selected for this research paper, a survey will be conducted.
本报告将对区块链的有效性进行研究,以提供更多背景信息。这里,将显示依赖于几个处理层的记录信息的同步。本研究试图对区块链进行简要概述,以及它如何影响对该主题的广泛文献评估。为了应用区块链的基本概念,将展示区块链技术在医疗保健领域的利弊。利用区块链技术,可以通过理解合并组件来避免医疗集团中的许多问题。由于区块链技术,我们已经看到了医疗保健行业的质量标准流程。它的文献部分将概述整个医疗保健及其操作。可以得出结论,通过对经过评估的出版物和杂志进行彻底评估,区块链技术被视为医疗领域的一个现实目标。据报道,区块链在医疗保健领域的一些最大目标是问责制和问责制。这篇文章将提供关于这个主题的宝贵见解,这将改变人们对区块链技术的看法。一般来说。这一主题的明显独创性将为进一步评价而讨论,这将为读者提供有用的来源。本研究将展示卫生保健工作者如何看待基于区块链的信息基础设施的许多方面。为了支持本研究论文所选择的方法,将进行一项调查。
{"title":"An Intensive Analysis of Recent Trends of Block Chain Technology in the Role of Development in the Healthcare Sector","authors":"Merin Thomas, V. Karunakaran","doi":"10.1109/SMART55829.2022.10047286","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047286","url":null,"abstract":"The efficacy of the block chain will be examined in this report to provide more context. Here, the synchronisation of records' information depending on several treatment layers will be shown. This study tries to give succinct overview of the block chain and how it influences an extensive literature assessment on the subject. To apply a fundamental concept of block - chain, pros and cons of block chain technology in the healthcare field will be shown. Utilizing block chain technology, many problems in medical groups may be avoided by comprehending incorporated components. We have seen quality standards processes in the healthcare industry as a result of block chain technology. The literature component of it will outline the whole healthcare and its operations. It may be concluded that block chain technology is seen as a realistic objective in the medical field by performing a thorough evaluation of publications and magazines that have undergone evaluation. Some of the biggest goals for blockchain in the health care field are reportedly accountability and accountability. This essay will provide priceless insights on the subject that will alter how people see block chain technology. in general. The apparent originality of this subject will be discussed for further evaluation, which will link readers to helpful sources. This study will demonstrate how health care workers may look at many facets of information infrastructure based on block chains. For the purpose of supporting the methodology selected for this research paper, a survey will be conducted.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autonomous Military Robot using IoT for Covert Operations and Multiutility Computing 使用物联网进行隐蔽行动和多用途计算的自主军事机器人
Anshuman Singh, Jagdeep Kaur Walia
Scientists are now intrigued by top, and the growth in human requirements has inspired both scientists and students to create new automated technologies. This essay may aid in understanding how the field of autonomous car technology is evolving. Their performance and usability have improved as a result of technological advancements and updates. The interaction between the autonomous vehicles or equipment is the most important necessity. Additionally, the Indian government is focusing a significant amount of money on military development. This research focuses on a connection mechanism between a wireless router bot that is perfect to the point that connecting does not provide a challenge. To do this, transceivers for data connection linking the games console to the car would have been set up on the Raspberry Binding protein relays (bot). Wi-fi connectors will serve as transmitting transmitters or extensions in this program to increase the connection and range of a far-off car. With using this connection, the robot could quickly send data to the patient's computer so that biometrics can be used to record a live broadcast. This project makes advantage of cutting-edge studies on types of networks and interconnection methods in IOT devices. The transmission method increases the chatbot's interaction with the user by deploying more relay bots, ensures that data transmission is untraceable, and widens the range of remote connections. Barriers and any suspicious behavior may be quickly recognized and reported to the military facility using the current algorithms.
科学家们现在对顶尖技术很感兴趣,人类需求的增长激发了科学家和学生们创造新的自动化技术。这篇文章可能有助于理解自动驾驶汽车技术领域是如何发展的。由于技术的进步和更新,它们的性能和可用性得到了改善。自动驾驶车辆或设备之间的交互是最重要的必要条件。此外,印度政府正在将大量资金集中在军事发展上。本研究的重点是无线路由器机器人之间的连接机制,该机制完美到连接不提供挑战的程度。要做到这一点,用于连接游戏机和汽车的数据收发器将被设置在树莓结合蛋白继电器(bot)上。在这个项目中,Wi-fi连接器将充当传输发射机或扩展器,以增加远程汽车的连接和范围。通过这种连接,机器人可以快速将数据发送到患者的电脑上,这样生物识别技术就可以用来录制直播。本项目利用了物联网设备中网络类型和互联方式的前沿研究。这种传输方式通过部署更多的中继机器人,增加了聊天机器人与用户的交互,保证了数据传输的不可追踪性,扩大了远程连接的范围。障碍物和任何可疑行为都可以使用当前的算法快速识别并报告给军事设施。
{"title":"Autonomous Military Robot using IoT for Covert Operations and Multiutility Computing","authors":"Anshuman Singh, Jagdeep Kaur Walia","doi":"10.1109/SMART55829.2022.10047025","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047025","url":null,"abstract":"Scientists are now intrigued by top, and the growth in human requirements has inspired both scientists and students to create new automated technologies. This essay may aid in understanding how the field of autonomous car technology is evolving. Their performance and usability have improved as a result of technological advancements and updates. The interaction between the autonomous vehicles or equipment is the most important necessity. Additionally, the Indian government is focusing a significant amount of money on military development. This research focuses on a connection mechanism between a wireless router bot that is perfect to the point that connecting does not provide a challenge. To do this, transceivers for data connection linking the games console to the car would have been set up on the Raspberry Binding protein relays (bot). Wi-fi connectors will serve as transmitting transmitters or extensions in this program to increase the connection and range of a far-off car. With using this connection, the robot could quickly send data to the patient's computer so that biometrics can be used to record a live broadcast. This project makes advantage of cutting-edge studies on types of networks and interconnection methods in IOT devices. The transmission method increases the chatbot's interaction with the user by deploying more relay bots, ensures that data transmission is untraceable, and widens the range of remote connections. Barriers and any suspicious behavior may be quickly recognized and reported to the military facility using the current algorithms.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"1123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122940069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Secure Mengers Authentication for Industrial IoT 基于区块链的工业物联网安全门格斯认证
Shashidhar Sonnad, M. Awasthy, Kantilal Rane, Moon Banerjee, D. Buddhi, Bhasker Pant
The Industrial Internet of Things (I-IoT) is positioned as one of the most evolutionarily potential techniques for enhancing the production environment, logistics, and production in industrial settings. While a production method is more complicated, it is necessary to give a full operational IoT where equipment from various environments, such as mobility, plan to operate on the same job, ensuring more security and confidentiality for equipment when communicating. Some popular something which result in third-party secure and address the main management challenges. As a result, security and confidentiality need more attention since they are still a problem. In this study, Menger's identification with block chain assistance is a brand-new and effective security method that is expected to build trust across diverse domains. Security is implemented here via the authorization process. Gadget privacy is maintained by the mengers verification system, which also achieves unit identification across linked devices. The distribution of keys among the linked parties is still subject to negotiation via the appropriate channels for communication. Here, MATLAB is used for the simulation, and the results demonstrate superior results during the authorization process.
工业物联网(I-IoT)被定位为最具进化潜力的技术之一,可以改善工业环境中的生产环境、物流和生产。虽然生产方法更复杂,但有必要提供一个完整的可操作物联网,其中来自各种环境(如移动性)的设备计划在同一工作上运行,确保通信时设备的安全性和保密性。一些流行的东西导致第三方安全并解决主要的管理挑战。因此,安全性和保密性需要更多的关注,因为它们仍然是一个问题。在本研究中,门格尔的区块链辅助身份识别是一种全新的、有效的安全方法,有望在不同领域建立信任。安全性在这里是通过授权过程实现的。小工具的隐私由mengers验证系统维护,该系统还实现了跨连接设备的单元识别。密钥在链接各方之间的分配仍然需要通过适当的通信渠道进行协商。这里使用MATLAB进行仿真,结果表明在授权过程中取得了较好的效果。
{"title":"Blockchain-Based Secure Mengers Authentication for Industrial IoT","authors":"Shashidhar Sonnad, M. Awasthy, Kantilal Rane, Moon Banerjee, D. Buddhi, Bhasker Pant","doi":"10.1109/SMART55829.2022.10046934","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046934","url":null,"abstract":"The Industrial Internet of Things (I-IoT) is positioned as one of the most evolutionarily potential techniques for enhancing the production environment, logistics, and production in industrial settings. While a production method is more complicated, it is necessary to give a full operational IoT where equipment from various environments, such as mobility, plan to operate on the same job, ensuring more security and confidentiality for equipment when communicating. Some popular something which result in third-party secure and address the main management challenges. As a result, security and confidentiality need more attention since they are still a problem. In this study, Menger's identification with block chain assistance is a brand-new and effective security method that is expected to build trust across diverse domains. Security is implemented here via the authorization process. Gadget privacy is maintained by the mengers verification system, which also achieves unit identification across linked devices. The distribution of keys among the linked parties is still subject to negotiation via the appropriate channels for communication. Here, MATLAB is used for the simulation, and the results demonstrate superior results during the authorization process.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Duality of Graph and Its Application in Electric Circuit 图的对偶性及其在电路中的应用
P. Kumar, A. Saxena, Gopal Kumar Gupta, Kamesh Kumar
Graph theory is broadly used to verify many arithmetical theories and models. This assessment introduces the use of numerous graph concept theories to clear up difficulties in numerous sectors of technology and generations similarly to arithmetic. A number of them fields encompass computer technology, chemistry, biology, virtual image processing, webpage design, scientific technology and overall performance studies. In a mathematical idea take a look at of the graph, a double graph of the Gr is a plane with a vertex of one face of Gr. A twin graph has the rims of every pair of facets in Gr splits from the alternative via the edge, and a self-loop where the equal face appears on each facets of the image(2). Here we explain a scholar task in which we build a calculation answer for an electrical circuit primarily based on graph concept theory. This multidisciplinary technique includes abstract mathematics, linear algebra, circuit physics and computer programming, in order to achieve the automated aim-solving intentions(1).
图论被广泛地用于验证许多算术理论和模型。这个评估介绍了许多图概念理论的使用,以澄清许多技术部门和世代的困难,类似于算术。其中一些领域包括计算机技术、化学、生物学、虚拟图像处理、网页设计、科学技术和整体性能研究。从数学的角度来看,Gr的双图是一个平面,其顶点是Gr的一个面。双图具有Gr中每一对切面的边缘,这些切面通过边缘从另一个面分裂出来,并且有一个自循环,其中相等的面出现在图像的每个切面上(2)。在这里,我们解释一个学者的任务,我们建立一个计算答案的电路主要基于图概念理论。这种多学科技术包括抽象数学、线性代数、电路物理和计算机编程,以实现自动目标求解的意图(1)。
{"title":"Duality of Graph and Its Application in Electric Circuit","authors":"P. Kumar, A. Saxena, Gopal Kumar Gupta, Kamesh Kumar","doi":"10.1109/SMART55829.2022.10047073","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047073","url":null,"abstract":"Graph theory is broadly used to verify many arithmetical theories and models. This assessment introduces the use of numerous graph concept theories to clear up difficulties in numerous sectors of technology and generations similarly to arithmetic. A number of them fields encompass computer technology, chemistry, biology, virtual image processing, webpage design, scientific technology and overall performance studies. In a mathematical idea take a look at of the graph, a double graph of the Gr is a plane with a vertex of one face of Gr. A twin graph has the rims of every pair of facets in Gr splits from the alternative via the edge, and a self-loop where the equal face appears on each facets of the image(2). Here we explain a scholar task in which we build a calculation answer for an electrical circuit primarily based on graph concept theory. This multidisciplinary technique includes abstract mathematics, linear algebra, circuit physics and computer programming, in order to achieve the automated aim-solving intentions(1).","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128924954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Median Filter in Comparison with Gabor Filter for Skin Cancer MRI Images Based on PSNR and MSE 基于PSNR和MSE的中值滤波与Gabor滤波对皮肤癌MRI图像的性能分析
S. Likhitha, R. Baskar
Themain aim of this research is to filter Skin Cancer MRI images based on the image processing technologies using novel median filter algorithm and is compared with Gabor filter algorithm. This research contains two groups, each with a sample size of 20 with Gpower of 80 percent. The performance of the novel median filter is evaluated and the performance measurements such as PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) are compared with the Gabor filter. According to the data obtained by simulating with matlab, the novel median filter's PSNR is 31.64, and its MSE is 9.094, whereas the Gabor filter's PSNR (Peak Signal to Noise Ratio) is 27.02, and its MSE (Mean Square Error) is 11.52. From the statistical analysis, it is observed that the significant value of PSNR (Peak Signal to Noise Ratio) (0.409) and $mathbf{p} > 0.05$ and value of MSE (0.010) of the algorithm is $mathbf{p} < 0.05$. In this study, it is found that the novel Median filter performs better than the Gabor filter in terms of PSNR and MSE.
本研究的主要目的是利用新的中值滤波算法对基于图像处理技术的皮肤癌MRI图像进行滤波,并与Gabor滤波算法进行比较。这项研究包含两组,每组的样本量为20,Gpower为80%。评估了新型中值滤波器的性能,并将PSNR(峰值信噪比)和MSE(均方误差)等性能指标与Gabor滤波器进行了比较。通过matlab仿真得到的数据表明,新型中值滤波器的PSNR为31.64,MSE为9.094,而Gabor滤波器的PSNR(峰值信噪比)为27.02,MSE(均方误差)为11.52。从统计分析中可以看出,该算法的峰值信噪比PSNR (Peak Signal to Noise Ratio)的显著值为0.409,且$mathbf{p} > 0.05$, MSE(0.010)的显著值为$mathbf{p} < 0.05$。本研究发现,在PSNR和MSE方面,新型中值滤波器优于Gabor滤波器。
{"title":"Performance Analysis of Median Filter in Comparison with Gabor Filter for Skin Cancer MRI Images Based on PSNR and MSE","authors":"S. Likhitha, R. Baskar","doi":"10.1109/SMART55829.2022.10047499","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047499","url":null,"abstract":"Themain aim of this research is to filter Skin Cancer MRI images based on the image processing technologies using novel median filter algorithm and is compared with Gabor filter algorithm. This research contains two groups, each with a sample size of 20 with Gpower of 80 percent. The performance of the novel median filter is evaluated and the performance measurements such as PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) are compared with the Gabor filter. According to the data obtained by simulating with matlab, the novel median filter's PSNR is 31.64, and its MSE is 9.094, whereas the Gabor filter's PSNR (Peak Signal to Noise Ratio) is 27.02, and its MSE (Mean Square Error) is 11.52. From the statistical analysis, it is observed that the significant value of PSNR (Peak Signal to Noise Ratio) (0.409) and $mathbf{p} > 0.05$ and value of MSE (0.010) of the algorithm is $mathbf{p} < 0.05$. In this study, it is found that the novel Median filter performs better than the Gabor filter in terms of PSNR and MSE.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129174460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1