首页 > 最新文献

Journal of Ubiquitous Computing and Communication Technologies最新文献

英文 中文
Augmentation for Blood Doping Discovery in Sports using Random Forest Ensembles with LightGBM 使用LightGBM的随机森林集合增强体育运动中血液兴奋剂的发现
Pub Date : 2022-07-26 DOI: 10.36548/jucct.2022.2.006
D. Sasikala, K. Venkatesh Sharma
Athletics bureaucrats round the globe are tackling implausible encounters owing to the partial methods of customs executed by the athletes to progress their enactment in their sports. It embraces the intake of hormonal centred remedies or transfusion of blood to upsurge their power and the effect of their coaching. On the other hand, the up-to-date direct test of discovery of these circumstances embraces the laboratory-centred technique viz restricted for the reason that of the cost factors, handiness of medical experts, etc. This ends us to pursue for indirect assessments. By the emergent curiosity of Artificial Intelligence (AI) in healthcare, it is vital to put forward a process built on blood factors to advance decision making. In this research script, a statistical and machine learning (ML) centred tactic was suggested to ascertain the concern of doping constituent rhEPO in blood units.
世界各地的体育官员都在处理不可信的遭遇,原因是运动员为了在运动中取得进步而采取的部分海关措施。它包括摄入以荷尔蒙为中心的补救措施或输血,以提高他们的力量和他们的指导效果。另一方面,最新的对发现这些情况的直接检验包括以实验室为中心的技术,但由于成本因素和医疗专家的便利等原因而受到限制。这使我们不得不进行间接评估。随着人工智能(AI)在医疗保健领域的兴起,提出一个基于血液因素的流程来促进决策至关重要。在本研究脚本中,提出了一种以统计和机器学习(ML)为中心的策略,以确定在血液单位中掺杂成分rhEPO的问题。
{"title":"Augmentation for Blood Doping Discovery in Sports using Random Forest Ensembles with LightGBM","authors":"D. Sasikala, K. Venkatesh Sharma","doi":"10.36548/jucct.2022.2.006","DOIUrl":"https://doi.org/10.36548/jucct.2022.2.006","url":null,"abstract":"Athletics bureaucrats round the globe are tackling implausible encounters owing to the partial methods of customs executed by the athletes to progress their enactment in their sports. It embraces the intake of hormonal centred remedies or transfusion of blood to upsurge their power and the effect of their coaching. On the other hand, the up-to-date direct test of discovery of these circumstances embraces the laboratory-centred technique viz restricted for the reason that of the cost factors, handiness of medical experts, etc. This ends us to pursue for indirect assessments. By the emergent curiosity of Artificial Intelligence (AI) in healthcare, it is vital to put forward a process built on blood factors to advance decision making. In this research script, a statistical and machine learning (ML) centred tactic was suggested to ascertain the concern of doping constituent rhEPO in blood units.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123579898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Review on Soft Computing in Data Analysis 软计算在数据分析中的应用综述
Pub Date : 2022-07-25 DOI: 10.36548/jucct.2022.2.005
S. Joseph
The ability to access, store, and process enormous volumes of data has significantly expanded due to technological advancements in computation, data storage, networks, and sensors. Large-scale data processing is becoming an increasingly important thing for both research and business. Clients, who are typically domain experts, face an enormous challenge and require assistance in handling huge amount of data's. Soft computing can indeed be characterised as a science of thought and logic that aids in navigating complex systems. This article is about the use of soft computing techniques to support data analysis in an intelligent manner.
由于计算、数据存储、网络和传感器方面的技术进步,访问、存储和处理海量数据的能力得到了显著扩展。大规模数据处理对于研究和商业来说都变得越来越重要。客户通常是领域专家,他们面临着巨大的挑战,需要协助处理大量数据。软计算确实可以被描述为一门思想和逻辑科学,它有助于导航复杂的系统。本文是关于使用软计算技术以智能方式支持数据分析。
{"title":"Review on Soft Computing in Data Analysis","authors":"S. Joseph","doi":"10.36548/jucct.2022.2.005","DOIUrl":"https://doi.org/10.36548/jucct.2022.2.005","url":null,"abstract":"The ability to access, store, and process enormous volumes of data has significantly expanded due to technological advancements in computation, data storage, networks, and sensors. Large-scale data processing is becoming an increasingly important thing for both research and business. Clients, who are typically domain experts, face an enormous challenge and require assistance in handling huge amount of data's. Soft computing can indeed be characterised as a science of thought and logic that aids in navigating complex systems. This article is about the use of soft computing techniques to support data analysis in an intelligent manner.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126160038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finding the Productivity of Implementing IoT in Malawi and improve the usage of IoT devices to enhance nation Building: A survey 发现在马拉维实施物联网的生产力并改善物联网设备的使用以加强国家建设:一项调查
Pub Date : 2022-07-23 DOI: 10.36548/jucct.2022.2.004
Rimlon Shibi, Ezhil Grace, G. Rashmi, D. N. Ponkumar
The Internet of Things (IoT) is a contemporary technology in today’s world by grabbing the industries, home and, research consideration with a firm stride. According to the research, the average number of IoT devices per household will be 50 million in this era. The evolution of IoT will make the existing household devices to be hoary and now it’s a good time to create IoT devices to be affordable for daily use by the survivors across the world. This research is to find out the productivity of implementing IoT and to avoid disturbing existing network architecture and the software Define Network (SDN) in the underdeveloped country like Malawi and the usage of IoT devices in every household, offices and in agriculture to enhance the development of Country.
物联网(IoT)是当今世界的一项当代技术,它以坚定的步伐占领了工业、家庭和研究领域。根据研究,在这个时代,每个家庭的物联网设备平均数量将达到5000万台。物联网的发展将使现有的家用设备变得陈旧,现在是创造物联网设备的好时机,让世界各地的幸存者都能负担得起日常使用。这项研究是为了找出实施物联网的生产力,避免在马拉维等不发达国家扰乱现有的网络架构和软件定义网络(SDN),以及在每个家庭,办公室和农业中使用物联网设备,以促进国家的发展。
{"title":"Finding the Productivity of Implementing IoT in Malawi and improve the usage of IoT devices to enhance nation Building: A survey","authors":"Rimlon Shibi, Ezhil Grace, G. Rashmi, D. N. Ponkumar","doi":"10.36548/jucct.2022.2.004","DOIUrl":"https://doi.org/10.36548/jucct.2022.2.004","url":null,"abstract":"The Internet of Things (IoT) is a contemporary technology in today’s world by grabbing the industries, home and, research consideration with a firm stride. According to the research, the average number of IoT devices per household will be 50 million in this era. The evolution of IoT will make the existing household devices to be hoary and now it’s a good time to create IoT devices to be affordable for daily use by the survivors across the world. This research is to find out the productivity of implementing IoT and to avoid disturbing existing network architecture and the software Define Network (SDN) in the underdeveloped country like Malawi and the usage of IoT devices in every household, offices and in agriculture to enhance the development of Country.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analytics with Data Visualization 预测分析与数据可视化
Pub Date : 2022-07-21 DOI: 10.36548/jucct.2022.2.003
Satheeshkumar Palanisamy
There has been tremendous growth for the need of analytics and BI tools in every organization, in every sector such as finance, software, medicine and even astronomy in order to better overall performance. C-factor Computing has the same vision of empowering their existing products through data analysis and forecasting to better suit the need of customers and decision making of stakeholders. The project involves 5 key aspects in Analytics - Data Acquisition, Big data or data Storage, Data Transformation (Unstructured to Structured), Data Wrangling, Predictive Modeling / Visualization. Data Acquisition involves gathering existing transactional and search data of customers and travel aggregators who use the product. This data is used to create powerful dashboards capable of predictive analytics which help the company make informed choices. The key aspects mentioned can be achieved through various tools available but requires testing at every stage in order to realize the appropriate software for the data present in the company. Hence the project deals with studying and implementing selected tools in order to provide the right framework to achieve an interactive dashboard capable of predictive analytics which can also be integrated into the existing products of the company.
为了提高整体绩效,每个组织、每个部门(如金融、软件、医学甚至天文学)对分析和商业智能工具的需求都在急剧增长。C-factor Computing拥有同样的愿景,即通过数据分析和预测来增强现有产品的能力,以更好地满足客户的需求和利益相关者的决策制定。该项目涉及分析学的5个关键方面——数据采集、大数据或数据存储、数据转换(非结构化到结构化)、数据整理、预测建模/可视化。数据获取包括收集使用该产品的客户和旅游聚合商的现有交易和搜索数据。这些数据用于创建强大的仪表板,能够进行预测分析,帮助公司做出明智的选择。提到的关键方面可以通过各种可用的工具来实现,但需要在每个阶段进行测试,以便为公司中存在的数据实现适当的软件。因此,该项目涉及研究和实施选定的工具,以提供正确的框架来实现能够预测分析的交互式仪表板,该仪表板也可以集成到公司的现有产品中。
{"title":"Predictive Analytics with Data Visualization","authors":"Satheeshkumar Palanisamy","doi":"10.36548/jucct.2022.2.003","DOIUrl":"https://doi.org/10.36548/jucct.2022.2.003","url":null,"abstract":"There has been tremendous growth for the need of analytics and BI tools in every organization, in every sector such as finance, software, medicine and even astronomy in order to better overall performance. C-factor Computing has the same vision of empowering their existing products through data analysis and forecasting to better suit the need of customers and decision making of stakeholders. The project involves 5 key aspects in Analytics - Data Acquisition, Big data or data Storage, Data Transformation (Unstructured to Structured), Data Wrangling, Predictive Modeling / Visualization. Data Acquisition involves gathering existing transactional and search data of customers and travel aggregators who use the product. This data is used to create powerful dashboards capable of predictive analytics which help the company make informed choices. The key aspects mentioned can be achieved through various tools available but requires testing at every stage in order to realize the appropriate software for the data present in the company. Hence the project deals with studying and implementing selected tools in order to provide the right framework to achieve an interactive dashboard capable of predictive analytics which can also be integrated into the existing products of the company.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"119 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126299651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LiFi- Future Technology LiFi-未来技术
Pub Date : 2022-07-08 DOI: 10.36548/jucct.2022.2.002
S. Smys, Jennifer S. Raj
The introduction of Wi-Fi into the residences is creating a biological havoc among humans. A lot of research has been evolved and presented depicting the various imperfections caused by the radiation of Wi-Fi. To overcome this LiFi technology may be used for indoor communication instead of Wi-Fi. LiFi communication needs line of sight for communication. LiFi transfers the information through visible light. Light cannot travel through opaque objects. The various properties of light like Reflection, Refraction, scattering effects on visible light will lead to data loss. Hence LiFi is preferably used indoors. This article discusses on the effects of biological degradation caused by Wi-Fi, Bluetooth etc. in short, this article enlists the effects of radio waves in accordance with the psychological changes caused in mankind. This in turn will lead to build a system which will also ensure the safety of the ecosystem for the development of mankind.
Wi-Fi的引入给人类带来了一场生物浩劫。许多研究已经发展并提出了Wi-Fi辐射引起的各种缺陷。为了克服这个问题,可以将LiFi技术用于室内通信而不是Wi-Fi。LiFi通信需要视线进行通信。LiFi通过可见光传输信息。光不能穿过不透明的物体。光的各种特性,如反射、折射、散射对可见光的影响,将导致数据丢失。因此,LiFi最好在室内使用。本文讨论的是Wi-Fi、蓝牙等无线电波对生物降解的影响,总之,本文将无线电波的影响按照人类的心理变化进行列举。这反过来将导致建立一个系统,该系统也将确保生态系统的安全,以促进人类的发展。
{"title":"LiFi- Future Technology","authors":"S. Smys, Jennifer S. Raj","doi":"10.36548/jucct.2022.2.002","DOIUrl":"https://doi.org/10.36548/jucct.2022.2.002","url":null,"abstract":"The introduction of Wi-Fi into the residences is creating a biological havoc among humans. A lot of research has been evolved and presented depicting the various imperfections caused by the radiation of Wi-Fi. To overcome this LiFi technology may be used for indoor communication instead of Wi-Fi. LiFi communication needs line of sight for communication. LiFi transfers the information through visible light. Light cannot travel through opaque objects. The various properties of light like Reflection, Refraction, scattering effects on visible light will lead to data loss. Hence LiFi is preferably used indoors. This article discusses on the effects of biological degradation caused by Wi-Fi, Bluetooth etc. in short, this article enlists the effects of radio waves in accordance with the psychological changes caused in mankind. This in turn will lead to build a system which will also ensure the safety of the ecosystem for the development of mankind.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmentation of AI-based Process for Blood Doping Discovery in Sports using Random Forest Ensembles with LightGBM 基于LightGBM的随机森林系统增强运动中血液兴奋剂发现的人工智能过程
Pub Date : 2022-07-04 DOI: 10.36548/jucct.2022.2.001
S. Ayyasamy
Metadata is an exploration of the given data. It organizes the data by grouping the collected information on a particular structure for easy understanding. Metadata reduces the computational burden on data mining algorithms by keeping an organized record. Data that are related to healthcare application requires serious attention on privacy concern and therefore such information are encrypted in most cases. Processing of encrypted data is difficult, and it may lead to estimate the prediction with a faulty output. Hence, a blockchain based data securing system is proposed in the work for securing the data that are transmitted from a ubiquitous computing device. The paper also incorporates the proposed work with a whale optimization algorithm for reducing the execution time required on the blockchain based data storage and retrieval process.
元数据是对给定数据的探索。它通过将收集到的信息分组到一个易于理解的特定结构来组织数据。元数据通过保持有组织的记录来减少数据挖掘算法的计算负担。与医疗保健应用程序相关的数据需要认真关注隐私问题,因此在大多数情况下,此类信息都是加密的。加密数据的处理是困难的,并且可能导致用错误的输出估计预测。因此,在工作中提出了基于区块链的数据保护系统,用于保护从无处不在的计算设备传输的数据。该论文还将拟议的工作与鲸鱼优化算法相结合,以减少基于区块链的数据存储和检索过程所需的执行时间。
{"title":"Augmentation of AI-based Process for Blood Doping Discovery in Sports using Random Forest Ensembles with LightGBM","authors":"S. Ayyasamy","doi":"10.36548/jucct.2022.2.001","DOIUrl":"https://doi.org/10.36548/jucct.2022.2.001","url":null,"abstract":"Metadata is an exploration of the given data. It organizes the data by grouping the collected information on a particular structure for easy understanding. Metadata reduces the computational burden on data mining algorithms by keeping an organized record. Data that are related to healthcare application requires serious attention on privacy concern and therefore such information are encrypted in most cases. Processing of encrypted data is difficult, and it may lead to estimate the prediction with a faulty output. Hence, a blockchain based data securing system is proposed in the work for securing the data that are transmitted from a ubiquitous computing device. The paper also incorporates the proposed work with a whale optimization algorithm for reducing the execution time required on the blockchain based data storage and retrieval process.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130841918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Software Sizing and Project Estimation prediction by Machine Learning Classification 基于机器学习分类的软件规模分析和项目估计预测
Pub Date : 2022-02-28 DOI: 10.36548/jucct.2021.4.006
A. Sathesh, Y. B. Hamdan
In this study, the outcomes of trials with various projects are analyzed in detail. Estimators may decrease mistakes by combining several estimating strategies, which helps them maintain a close eye on the difference between their estimations and reality. An effort estimate is a method for estimating a model's correctness by calculating the total amount of effort needed. It's a major pain in the backside of software development. Several prediction methods have recently been created to find an appropriate estimate. The suggested SVM approach is utilized to reduce the estimation error for the project estimate to the lowest possible value. As a result, throughout the software sizing process, the ideal or exact forecast is achieved. Early in a model's development, the estimate is erroneous since the needs are not defined, but as the model evolves, it becomes more and more accurate. Because of this, it is critical to choose a precise estimate for each software model development. Observations and suggestions for further study of software sizing approaches are also included in the report.
在本研究中,详细分析了不同项目的试验结果。评估人员可以通过组合几种评估策略来减少错误,这有助于他们密切关注评估与现实之间的差异。工作量估计是一种通过计算所需工作量来估计模型正确性的方法。这是软件开发背后的一大痛苦。最近已经创建了几种预测方法来找到适当的估计。利用建议的支持向量机方法将项目估计的估计误差降低到尽可能低的值。因此,在整个软件尺寸确定过程中,可以实现理想或准确的预测。在模型开发的早期,由于没有定义需求,估计是错误的,但是随着模型的发展,它变得越来越准确。因此,为每个软件模型开发选择一个精确的估计是至关重要的。报告中还包括对进一步研究软件规模确定方法的意见和建议。
{"title":"Analysis of Software Sizing and Project Estimation prediction by Machine Learning Classification","authors":"A. Sathesh, Y. B. Hamdan","doi":"10.36548/jucct.2021.4.006","DOIUrl":"https://doi.org/10.36548/jucct.2021.4.006","url":null,"abstract":"In this study, the outcomes of trials with various projects are analyzed in detail. Estimators may decrease mistakes by combining several estimating strategies, which helps them maintain a close eye on the difference between their estimations and reality. An effort estimate is a method for estimating a model's correctness by calculating the total amount of effort needed. It's a major pain in the backside of software development. Several prediction methods have recently been created to find an appropriate estimate. The suggested SVM approach is utilized to reduce the estimation error for the project estimate to the lowest possible value. As a result, throughout the software sizing process, the ideal or exact forecast is achieved. Early in a model's development, the estimate is erroneous since the needs are not defined, but as the model evolves, it becomes more and more accurate. Because of this, it is critical to choose a precise estimate for each software model development. Observations and suggestions for further study of software sizing approaches are also included in the report.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review on Deep Learning based Network Security Tools in Detecting Real-Time Vulnerabilities 基于深度学习的网络安全工具实时漏洞检测研究综述
Pub Date : 2022-01-31 DOI: 10.36548/jucct.2021.4.005
E. Baraneetharan
Network connected hardware and software systems are always open to vulnerabilities when they are connected with an outdated firewall or an unknown Wi-Fi access. Therefore network based anti-virus software and intrusion detection systems are widely installed in every network connected hardwares. However, the pre-installed security softwares are not quite capable in identifying the attacks when evolved. Similarly, the traditional network security tools that are available in the current market are not efficient in handling the attacks when the system is connected with a cloud environment or IoT network. Hence, recent algorithms of security tools are incorporated with the deep learning network for improving its intrusion detection rate. The adaptability of deep learning network is comparatively high over the traditional software tools when it is employed with a feedback network. The feedback connections included in the deep learning networks produce a response signal to their own network connections as a training signal for improving their work performances. This improves the performances of deep learning-based security tools while it is in real-time operation. The motive of the work is to review and present the attainments of the deep learning-based vulnerability detection models along with their limitations.
当与过时的防火墙或未知的Wi-Fi连接时,网络连接的硬件和软件系统总是容易受到漏洞的影响。因此,基于网络的杀毒软件和入侵检测系统被广泛地安装在每一个联网的硬件中。然而,预先安装的安全软件在进化时并不能很好地识别攻击。同样,当系统与云环境或物联网网络连接时,目前市场上可用的传统网络安全工具在处理攻击时效率不高。因此,将最新的安全工具算法与深度学习网络相结合,以提高其入侵检测率。当深度学习网络与反馈网络结合使用时,其自适应性比传统的软件工具要高。深度学习网络中包含的反馈连接对其自身的网络连接产生响应信号,作为提高其工作性能的训练信号。这提高了基于深度学习的安全工具在实时运行时的性能。这项工作的动机是回顾和介绍基于深度学习的漏洞检测模型的成就以及它们的局限性。
{"title":"Review on Deep Learning based Network Security Tools in Detecting Real-Time Vulnerabilities","authors":"E. Baraneetharan","doi":"10.36548/jucct.2021.4.005","DOIUrl":"https://doi.org/10.36548/jucct.2021.4.005","url":null,"abstract":"Network connected hardware and software systems are always open to vulnerabilities when they are connected with an outdated firewall or an unknown Wi-Fi access. Therefore network based anti-virus software and intrusion detection systems are widely installed in every network connected hardwares. However, the pre-installed security softwares are not quite capable in identifying the attacks when evolved. Similarly, the traditional network security tools that are available in the current market are not efficient in handling the attacks when the system is connected with a cloud environment or IoT network. Hence, recent algorithms of security tools are incorporated with the deep learning network for improving its intrusion detection rate. The adaptability of deep learning network is comparatively high over the traditional software tools when it is employed with a feedback network. The feedback connections included in the deep learning networks produce a response signal to their own network connections as a training signal for improving their work performances. This improves the performances of deep learning-based security tools while it is in real-time operation. The motive of the work is to review and present the attainments of the deep learning-based vulnerability detection models along with their limitations.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Bayesian Regularization Approach to Predict the Quality of Injection-Moulded Components by statistical SVM for Online Monitoring system 基于统计支持向量机的注塑件质量预测贝叶斯正则化方法
Pub Date : 2022-01-27 DOI: 10.36548/jucct.2021.4.004
Dinesh Kumar Anguraj
To evaluate the quality of injection-molded components, conventional approaches are costly, time-consuming, or based on statistical process control characteristics that are not always accurate. Machine learning might be used to categorise components based on their quality. In order to accurately estimate the quality of injection moulded components, this study uses a SVM classifier. In addition, the form of the spare components after the working method product in simulation is classified as "qualified" or "unqualified". The quality indicators have an excellent association with data recordings from the original database of various sensors such as pressure and temperature used in the proposed network model for online prediction. The outliers are removed from the input original data to minimize the deviation of precision or prediction accuracy of the model performance metrics. Data points in the "to-be-confirmed" region (which is in the fit line area) may be misjudged by this statistical SVM model since it is placed between the "qualified" and "unqualified" areas. This statistical procedure in the proposed SVM model also uses Bayesian regularisation to classify final components into distinct quality levels.
为了评估注塑成型部件的质量,传统的方法是昂贵的,耗时的,或者基于统计过程控制特性,并不总是准确的。机器学习可以用于根据质量对组件进行分类。为了准确地估计注塑件的质量,本研究使用了支持向量机分类器。此外,将模拟工作方法产品后的备件形式划分为“合格”或“不合格”。质量指标与用于在线预测的网络模型中使用的各种传感器(如压力和温度)的原始数据库中的数据记录具有良好的关联。从输入原始数据中去除异常值,以尽量减少模型性能指标的精度或预测精度的偏差。“待确认”区域(拟合线区域)的数据点由于位于“合格”和“不合格”区域之间,可能会被统计SVM模型误判。所提出的支持向量机模型中的统计过程也使用贝叶斯正则化将最终组件分类为不同的质量水平。
{"title":"A Bayesian Regularization Approach to Predict the Quality of Injection-Moulded Components by statistical SVM for Online Monitoring system","authors":"Dinesh Kumar Anguraj","doi":"10.36548/jucct.2021.4.004","DOIUrl":"https://doi.org/10.36548/jucct.2021.4.004","url":null,"abstract":"To evaluate the quality of injection-molded components, conventional approaches are costly, time-consuming, or based on statistical process control characteristics that are not always accurate. Machine learning might be used to categorise components based on their quality. In order to accurately estimate the quality of injection moulded components, this study uses a SVM classifier. In addition, the form of the spare components after the working method product in simulation is classified as \"qualified\" or \"unqualified\". The quality indicators have an excellent association with data recordings from the original database of various sensors such as pressure and temperature used in the proposed network model for online prediction. The outliers are removed from the input original data to minimize the deviation of precision or prediction accuracy of the model performance metrics. Data points in the \"to-be-confirmed\" region (which is in the fit line area) may be misjudged by this statistical SVM model since it is placed between the \"qualified\" and \"unqualified\" areas. This statistical procedure in the proposed SVM model also uses Bayesian regularisation to classify final components into distinct quality levels.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Classification Technique to Detect the Changes of Regimes in Financial Markets by Hybrid CNN-based Prediction 基于cnn混合预测的高级分类技术检测金融市场制度变化
Pub Date : 2022-01-20 DOI: 10.36548/jucct.2021.4.003
K. Geetha
Traders' tactics shift in response to the shifting market circumstances. The statistical features of price fluctuations may be significantly altered by the collective conduct of traders. When some changes in the market eventuate, a "regime shift" takes place. According to the observed directional shifts, this proposed study attempts to define what constitutes between normal and abnormal market regimes in the financial markets. The study begins by using data from ten financial marketplaces. For each call, a time frame in which major events may have led to regime change is chosen. Using the previous returns of all the companies in the index, this study investigates the usage of a CNN with SVM deep learning hybrid to anticipate the index's movement. The experiment findings reveal that this CNN model can successfully extract more generic and useful features than conventional technical indicators and produce more resilient and lucrative financial performance than earlier machine learning techniques. Most of the inability to forecast is due to randomness, and a small amount is due to non-stationarity. There is also a statistical correlation between the legal regimes of various marketplaces. Using this data, it is conceivable to tell the difference between normal regimes and lawful regimes. The results show that the stock market efficiency has never been tested before with such a large data set, and this is a significant step forward for weak-form market efficiency testing.
交易员的策略会随着市场环境的变化而变化。交易者的集体行为可能显著改变价格波动的统计特征。当市场发生一些变化时,就会发生“政权转移”。根据观察到的方向变化,本研究试图定义金融市场中正常和异常市场机制之间的构成。这项研究首先使用了来自10个金融市场的数据。对于每个呼叫,选择一个可能导致政权更迭的重大事件的时间框架。利用指数中所有公司以前的收益,本研究调查了CNN与SVM深度学习混合的使用情况,以预测指数的运动。实验结果表明,与传统的技术指标相比,该CNN模型可以成功地提取更多通用和有用的特征,并且比早期的机器学习技术产生更有弹性和更有利可图的财务绩效。大部分无法预测是由于随机性,少部分是由于非平稳性。不同市场的法律制度之间也存在统计相关性。利用这些数据,可以想象出正常政体和合法政体之间的区别。结果表明,在此之前从未使用如此大的数据集对股票市场效率进行过测试,这是对弱形式市场效率测试的重要一步。
{"title":"Advanced Classification Technique to Detect the Changes of Regimes in Financial Markets by Hybrid CNN-based Prediction","authors":"K. Geetha","doi":"10.36548/jucct.2021.4.003","DOIUrl":"https://doi.org/10.36548/jucct.2021.4.003","url":null,"abstract":"Traders' tactics shift in response to the shifting market circumstances. The statistical features of price fluctuations may be significantly altered by the collective conduct of traders. When some changes in the market eventuate, a \"regime shift\" takes place. According to the observed directional shifts, this proposed study attempts to define what constitutes between normal and abnormal market regimes in the financial markets. The study begins by using data from ten financial marketplaces. For each call, a time frame in which major events may have led to regime change is chosen. Using the previous returns of all the companies in the index, this study investigates the usage of a CNN with SVM deep learning hybrid to anticipate the index's movement. The experiment findings reveal that this CNN model can successfully extract more generic and useful features than conventional technical indicators and produce more resilient and lucrative financial performance than earlier machine learning techniques. Most of the inability to forecast is due to randomness, and a small amount is due to non-stationarity. There is also a statistical correlation between the legal regimes of various marketplaces. Using this data, it is conceivable to tell the difference between normal regimes and lawful regimes. The results show that the stock market efficiency has never been tested before with such a large data set, and this is a significant step forward for weak-form market efficiency testing.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Ubiquitous Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1