首页 > 最新文献

EAI Endorsed Transactions on Internet of Things最新文献

英文 中文
Identification of Lithology from Well Log Data Using Machine Learning 利用机器学习从测井数据中识别岩性
Pub Date : 2024-04-04 DOI: 10.4108/eetiot.5634
Rohit, Shri Ram Manda, Aditya Raj, Akshay Dheeraj, G. Rawat, Tanupriya Choudhury
INTRODUCTION: Reservoir characterisation and geomechanical modelling benefit significantly from diverse machine learning techniques, addressing complexities inherent in subsurface information. Accurate lithology identification is pivotal, furnishing crucial insights into subsurface geological formations. Lithology is pivotal in appraising hydrocarbon accumulation potential and optimising drilling strategies. OBJECTIVES: This study employs multiple machine learning models to discern lithology from the well-log data of the Volve Field. METHODS: The well log data of the Volve field comprises of 10,220 data points with diverse features influencing the target variable, lithology. The dataset encompasses four primary lithologies—sandstone, limestone, marl, and claystone—constituting a complex subsurface stratum. Lithology identification is framed as a classification problem, and four distinct ML algorithms are deployed to train and assess the models, partitioning the dataset into a 7:3 ratio for training and testing, respectively. RESULTS: The resulting confusion matrix indicates a close alignment between predicted and true labels. While all algorithms exhibit favourable performance, the decision tree algorithm demonstrates the highest efficacy, yielding an exceptional overall accuracy of 0.98. CONCLUSION: Notably, this model's training spans diverse wells within the same basin, showcasing its capability to predict lithology within intricate strata. Additionally, its robustness positions it as a potential tool for identifying other properties of rock formations.
简介:储层特征描述和地质力学建模极大地受益于各种机器学习技术,解决了地下信息固有的复杂性。准确的岩性识别至关重要,可提供对地下地质构造的重要见解。岩性在评估碳氢化合物积累潜力和优化钻井策略方面至关重要。目标:本研究采用多种机器学习模型,从 Volve 油田的井记录数据中识别岩性。方法:Volve 油田的测井数据包括 10,220 个数据点,这些数据点具有影响目标变量(岩性)的各种特征。数据集包括四种主要岩性--砂岩、石灰岩、泥灰岩和粘土岩,构成了复杂的地下地层。岩性识别是一个分类问题,采用四种不同的 ML 算法来训练和评估模型,将数据集按 7:3 的比例分别用于训练和测试。结果:产生的混淆矩阵表明,预测标签和真实标签之间的吻合度很高。虽然所有算法都表现出了良好的性能,但决策树算法的效率最高,总体准确率达到了 0.98。结论:值得注意的是,该模型的训练跨越了同一盆地的不同油井,展示了其预测复杂地层岩性的能力。此外,该模型的稳健性使其成为识别岩层其他属性的潜在工具。
{"title":"Identification of Lithology from Well Log Data Using Machine Learning","authors":"Rohit, Shri Ram Manda, Aditya Raj, Akshay Dheeraj, G. Rawat, Tanupriya Choudhury","doi":"10.4108/eetiot.5634","DOIUrl":"https://doi.org/10.4108/eetiot.5634","url":null,"abstract":"INTRODUCTION: Reservoir characterisation and geomechanical modelling benefit significantly from diverse machine learning techniques, addressing complexities inherent in subsurface information. Accurate lithology identification is pivotal, furnishing crucial insights into subsurface geological formations. Lithology is pivotal in appraising hydrocarbon accumulation potential and optimising drilling strategies. \u0000OBJECTIVES: This study employs multiple machine learning models to discern lithology from the well-log data of the Volve Field. \u0000METHODS: The well log data of the Volve field comprises of 10,220 data points with diverse features influencing the target variable, lithology. The dataset encompasses four primary lithologies—sandstone, limestone, marl, and claystone—constituting a complex subsurface stratum. Lithology identification is framed as a classification problem, and four distinct ML algorithms are deployed to train and assess the models, partitioning the dataset into a 7:3 ratio for training and testing, respectively. \u0000RESULTS: The resulting confusion matrix indicates a close alignment between predicted and true labels. While all algorithms exhibit favourable performance, the decision tree algorithm demonstrates the highest efficacy, yielding an exceptional overall accuracy of 0.98. \u0000CONCLUSION: Notably, this model's training spans diverse wells within the same basin, showcasing its capability to predict lithology within intricate strata. Additionally, its robustness positions it as a potential tool for identifying other properties of rock formations.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"55 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140742800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust GAN-Based CNN Model as Generative AI Application for Deepfake Detection 基于鲁棒 GAN 的 CNN 模型作为生成式人工智能应用于深度伪造检测
Pub Date : 2024-04-04 DOI: 10.4108/eetiot.5637
Preeti Sharma, Manoj Kumar, Hiteshwari Sharma
One of the most well-known generative AI models is the Generative Adversarial Network (GAN), which is frequently employed for data generation or augmentation. In this paper a reliable GAN-based CNN deepfake detection method utilizing GAN as an augmentation element is implemented. It aims to give the CNN model a big collection of images so that it can train better with the intrinsic qualities of the images. The major objective of this research is to show how GAN innovations have enhanced and increased the use of generative AI principles, particularly in fake image classification called Deepfakes that poses concerns about misrepresentation and individual privacy.  For identifying these fake photos more synthetic images are created using the GAN model that closely resemble the training data.  It has been observed that GAN-augmented datasets can improve the robustness and generality of CNN-based detection models, which correctly identify between real and false images by 96.35%.
生成对抗网络(GAN)是最著名的生成人工智能模型之一,经常被用于数据生成或增强。本文利用 GAN 作为增强元素,实现了一种可靠的基于 GAN 的 CNN 深度防伪检测方法。该方法旨在为 CNN 模型提供大量图像,使其能更好地利用图像的内在质量进行训练。这项研究的主要目的是展示 GAN 创新如何增强和增加了生成式人工智能原理的应用,尤其是在被称为 Deepfakes 的假图像分类中,因为这种分类会引起对虚假陈述和个人隐私的担忧。 为了识别这些假照片,我们使用与训练数据非常相似的 GAN 模型创建了更多合成图像。 据观察,GAN 增强数据集可提高基于 CNN 的检测模型的鲁棒性和通用性,其识别真假图像的正确率高达 96.35%。
{"title":"Robust GAN-Based CNN Model as Generative AI Application for Deepfake Detection","authors":"Preeti Sharma, Manoj Kumar, Hiteshwari Sharma","doi":"10.4108/eetiot.5637","DOIUrl":"https://doi.org/10.4108/eetiot.5637","url":null,"abstract":"One of the most well-known generative AI models is the Generative Adversarial Network (GAN), which is frequently employed for data generation or augmentation. In this paper a reliable GAN-based CNN deepfake detection method utilizing GAN as an augmentation element is implemented. It aims to give the CNN model a big collection of images so that it can train better with the intrinsic qualities of the images. The major objective of this research is to show how GAN innovations have enhanced and increased the use of generative AI principles, particularly in fake image classification called Deepfakes that poses concerns about misrepresentation and individual privacy.  For identifying these fake photos more synthetic images are created using the GAN model that closely resemble the training data.  It has been observed that GAN-augmented datasets can improve the robustness and generality of CNN-based detection models, which correctly identify between real and false images by 96.35%.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"86 9‐12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140742427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Prediction using Machine Learning 利用机器学习预测犯罪
Pub Date : 2024-02-15 DOI: 10.4108/eetiot.5123
Sridharan S, Srish N, Vigneswaran S, Santhi P
The process of researching crime patterns and trends in order to find underlying issues and potential solutions to crime prevention is known as crime analysis. This includes using statistical analysis, geographic mapping, and other approaches of type and scope of crime in their areas. Crime analysis can also entail the creation of predictive models that use previous data to anticipate future crime tendencies. Law enforcement authorities can more efficiently allocate resources and target initiatives to reduce crime and increase public safety by evaluating crime data and finding trends. For prediction, this data was fed into algorithms such as Linear Regression and Random Forest. Using data from 2001 to 2016, crime-type projections are made for each state as well as all states in India. Simple visualisation charts are used to represent these predictions. One critical feature of these algorithms is identifying the trend-changing year in order to boost the accuracy of the predictions. The main aim is to predict crime cases from 2017 to 2020 by using the dataset from 2001 to 2016.
对犯罪模式和趋势进行研究,以找出潜在问题和预防犯罪的潜在解决方案的过程被称为犯罪分析。这包括使用统计分析、地理制图和其他方法来分析其所在地区的犯罪类型和范围。犯罪分析还包括创建预测模型,利用以前的数据来预测未来的犯罪趋势。执法部门可以通过评估犯罪数据和发现犯罪趋势,更有效地分配资源,有针对性地采取减少犯罪和提高公共安全的措施。为了进行预测,这些数据被输入线性回归和随机森林等算法。利用 2001 年至 2016 年的数据,对印度各邦以及所有邦的犯罪类型进行了预测。使用简单的可视化图表来表示这些预测。这些算法的一个关键特点是识别趋势变化的年份,以提高预测的准确性。主要目的是利用 2001 年至 2016 年的数据集预测 2017 年至 2020 年的犯罪案件。
{"title":"Crime Prediction using Machine Learning","authors":"Sridharan S, Srish N, Vigneswaran S, Santhi P","doi":"10.4108/eetiot.5123","DOIUrl":"https://doi.org/10.4108/eetiot.5123","url":null,"abstract":"The process of researching crime patterns and trends in order to find underlying issues and potential solutions to crime prevention is known as crime analysis. This includes using statistical analysis, geographic mapping, and other approaches of type and scope of crime in their areas. Crime analysis can also entail the creation of predictive models that use previous data to anticipate future crime tendencies. Law enforcement authorities can more efficiently allocate resources and target initiatives to reduce crime and increase public safety by evaluating crime data and finding trends. For prediction, this data was fed into algorithms such as Linear Regression and Random Forest. Using data from 2001 to 2016, crime-type projections are made for each state as well as all states in India. Simple visualisation charts are used to represent these predictions. One critical feature of these algorithms is identifying the trend-changing year in order to boost the accuracy of the predictions. The main aim is to predict crime cases from 2017 to 2020 by using the dataset from 2001 to 2016.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"224 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139834082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Prediction using Machine Learning 利用机器学习预测犯罪
Pub Date : 2024-02-15 DOI: 10.4108/eetiot.5123
Sridharan S, Srish N, Vigneswaran S, Santhi P
The process of researching crime patterns and trends in order to find underlying issues and potential solutions to crime prevention is known as crime analysis. This includes using statistical analysis, geographic mapping, and other approaches of type and scope of crime in their areas. Crime analysis can also entail the creation of predictive models that use previous data to anticipate future crime tendencies. Law enforcement authorities can more efficiently allocate resources and target initiatives to reduce crime and increase public safety by evaluating crime data and finding trends. For prediction, this data was fed into algorithms such as Linear Regression and Random Forest. Using data from 2001 to 2016, crime-type projections are made for each state as well as all states in India. Simple visualisation charts are used to represent these predictions. One critical feature of these algorithms is identifying the trend-changing year in order to boost the accuracy of the predictions. The main aim is to predict crime cases from 2017 to 2020 by using the dataset from 2001 to 2016.
对犯罪模式和趋势进行研究,以找出潜在问题和预防犯罪的潜在解决方案的过程被称为犯罪分析。这包括使用统计分析、地理制图和其他方法来分析其所在地区的犯罪类型和范围。犯罪分析还包括创建预测模型,利用以前的数据来预测未来的犯罪趋势。执法部门可以通过评估犯罪数据和发现犯罪趋势,更有效地分配资源,有针对性地采取减少犯罪和提高公共安全的措施。为了进行预测,这些数据被输入线性回归和随机森林等算法。利用 2001 年至 2016 年的数据,对印度各邦以及所有邦的犯罪类型进行了预测。使用简单的可视化图表来表示这些预测。这些算法的一个关键特点是识别趋势变化的年份,以提高预测的准确性。主要目的是利用 2001 年至 2016 年的数据集预测 2017 年至 2020 年的犯罪案件。
{"title":"Crime Prediction using Machine Learning","authors":"Sridharan S, Srish N, Vigneswaran S, Santhi P","doi":"10.4108/eetiot.5123","DOIUrl":"https://doi.org/10.4108/eetiot.5123","url":null,"abstract":"The process of researching crime patterns and trends in order to find underlying issues and potential solutions to crime prevention is known as crime analysis. This includes using statistical analysis, geographic mapping, and other approaches of type and scope of crime in their areas. Crime analysis can also entail the creation of predictive models that use previous data to anticipate future crime tendencies. Law enforcement authorities can more efficiently allocate resources and target initiatives to reduce crime and increase public safety by evaluating crime data and finding trends. For prediction, this data was fed into algorithms such as Linear Regression and Random Forest. Using data from 2001 to 2016, crime-type projections are made for each state as well as all states in India. Simple visualisation charts are used to represent these predictions. One critical feature of these algorithms is identifying the trend-changing year in order to boost the accuracy of the predictions. The main aim is to predict crime cases from 2017 to 2020 by using the dataset from 2001 to 2016.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"1 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139774585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circumventing Stragglers and Staleness in Distributed CNN using LSTM 利用 LSTM 规避分布式 CNN 中的落伍者和停滞现象
Pub Date : 2024-02-14 DOI: 10.4108/eetiot.5119
A. Ravikumar, Harini Sriraman, Saddikuti Lokesh, Jitendra Sai
INTRODUCTION: Using neural networks for these inherently distributed applications is challenging and time-consuming. There is a crucial need for a framework that supports a distributed deep neural network to yield accurate results at an accelerated time. METHODS: In the proposed framework, any experienced novice user can utilize and execute the neural network models in a distributed manner with the automated hyperparameter tuning feature. In addition, the proposed framework is provided in AWS Sage maker for scaling the distribution and achieving exascale FLOPS. We benchmarked the framework performance by applying it to a medical dataset. RESULTS: The maximum performance is achieved with a speedup of 6.59 in 5 nodes. The model encourages expert/ novice neural network users to apply neural network models in the distributed platform and get enhanced results with accelerated training time. There has been a lot of research on how to improve the training time of Convolutional Neural Networks (CNNs) using distributed models, with a particular emphasis on automating the hyperparameter tweaking process. The study shows that training times may be decreased across the board by not just manually tweaking hyperparameters, but also by using L2 regularization, a dropout layer, and ConvLSTM for automatic hyperparameter modification. CONCLUSION: The proposed method improved the training speed for model-parallel setups by 1.4% and increased the speed for parallel data by 2.206%. Data-parallel execution achieved a high accuracy of 93.3825%, whereas model-parallel execution achieved a top accuracy of 89.59%.
简介:将神经网络用于这些固有的分布式应用具有挑战性且耗时。因此亟需一个支持分布式深度神经网络的框架,以便在更短的时间内获得准确的结果。方法:在提议的框架中,任何有经验的新手用户都可以利用自动超参数调整功能,以分布式方式使用和执行神经网络模型。此外,我们还在 AWS Sage maker 中提供了拟议框架,用于扩展分布式系统并实现超大规模 FLOPS。我们将该框架应用于医疗数据集,对其性能进行了基准测试。结果:在 5 个节点上实现了最高性能,速度提高了 6.59 倍。该模型鼓励神经网络专家/新手用户在分布式平台上应用神经网络模型,并通过加快训练时间来获得更好的结果。关于如何利用分布式模型改善卷积神经网络(CNN)的训练时间,已经有很多研究,尤其强调超参数调整过程的自动化。研究表明,不仅可以通过手动调整超参数,还可以通过使用 L2 正则化、剔除层和 ConvLSTM 自动修改超参数来全面缩短训练时间。结论:所提出的方法将模型并行设置的训练速度提高了 1.4%,并行数据的训练速度提高了 2.206%。数据并行执行的准确率高达 93.3825%,而模型并行执行的最高准确率为 89.59%。
{"title":"Circumventing Stragglers and Staleness in Distributed CNN using LSTM","authors":"A. Ravikumar, Harini Sriraman, Saddikuti Lokesh, Jitendra Sai","doi":"10.4108/eetiot.5119","DOIUrl":"https://doi.org/10.4108/eetiot.5119","url":null,"abstract":"INTRODUCTION: Using neural networks for these inherently distributed applications is challenging and time-consuming. There is a crucial need for a framework that supports a distributed deep neural network to yield accurate results at an accelerated time. \u0000METHODS: In the proposed framework, any experienced novice user can utilize and execute the neural network models in a distributed manner with the automated hyperparameter tuning feature. In addition, the proposed framework is provided in AWS Sage maker for scaling the distribution and achieving exascale FLOPS. We benchmarked the framework performance by applying it to a medical dataset. \u0000RESULTS: The maximum performance is achieved with a speedup of 6.59 in 5 nodes. The model encourages expert/ novice neural network users to apply neural network models in the distributed platform and get enhanced results with accelerated training time. There has been a lot of research on how to improve the training time of Convolutional Neural Networks (CNNs) using distributed models, with a particular emphasis on automating the hyperparameter tweaking process. The study shows that training times may be decreased across the board by not just manually tweaking hyperparameters, but also by using L2 regularization, a dropout layer, and ConvLSTM for automatic hyperparameter modification. \u0000CONCLUSION: The proposed method improved the training speed for model-parallel setups by 1.4% and increased the speed for parallel data by 2.206%. Data-parallel execution achieved a high accuracy of 93.3825%, whereas model-parallel execution achieved a top accuracy of 89.59%.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"50 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139778071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circumventing Stragglers and Staleness in Distributed CNN using LSTM 利用 LSTM 规避分布式 CNN 中的落伍者和停滞现象
Pub Date : 2024-02-14 DOI: 10.4108/eetiot.5119
A. Ravikumar, Harini Sriraman, Saddikuti Lokesh, Jitendra Sai
INTRODUCTION: Using neural networks for these inherently distributed applications is challenging and time-consuming. There is a crucial need for a framework that supports a distributed deep neural network to yield accurate results at an accelerated time. METHODS: In the proposed framework, any experienced novice user can utilize and execute the neural network models in a distributed manner with the automated hyperparameter tuning feature. In addition, the proposed framework is provided in AWS Sage maker for scaling the distribution and achieving exascale FLOPS. We benchmarked the framework performance by applying it to a medical dataset. RESULTS: The maximum performance is achieved with a speedup of 6.59 in 5 nodes. The model encourages expert/ novice neural network users to apply neural network models in the distributed platform and get enhanced results with accelerated training time. There has been a lot of research on how to improve the training time of Convolutional Neural Networks (CNNs) using distributed models, with a particular emphasis on automating the hyperparameter tweaking process. The study shows that training times may be decreased across the board by not just manually tweaking hyperparameters, but also by using L2 regularization, a dropout layer, and ConvLSTM for automatic hyperparameter modification. CONCLUSION: The proposed method improved the training speed for model-parallel setups by 1.4% and increased the speed for parallel data by 2.206%. Data-parallel execution achieved a high accuracy of 93.3825%, whereas model-parallel execution achieved a top accuracy of 89.59%.
简介:将神经网络用于这些固有的分布式应用具有挑战性且耗时。因此亟需一个支持分布式深度神经网络的框架,以便在更短的时间内获得准确的结果。方法:在提议的框架中,任何有经验的新手用户都可以利用自动超参数调整功能,以分布式方式使用和执行神经网络模型。此外,我们还在 AWS Sage maker 中提供了拟议框架,用于扩展分布式系统并实现超大规模 FLOPS。我们将该框架应用于医疗数据集,对其性能进行了基准测试。结果:在 5 个节点上实现了最高性能,速度提高了 6.59 倍。该模型鼓励神经网络专家/新手用户在分布式平台上应用神经网络模型,并通过加快训练时间来获得更好的结果。关于如何利用分布式模型改善卷积神经网络(CNN)的训练时间,已经有很多研究,尤其强调超参数调整过程的自动化。研究表明,不仅可以通过手动调整超参数,还可以通过使用 L2 正则化、剔除层和 ConvLSTM 自动修改超参数来全面缩短训练时间。结论:所提出的方法将模型并行设置的训练速度提高了 1.4%,并行数据的训练速度提高了 2.206%。数据并行执行的准确率高达 93.3825%,而模型并行执行的最高准确率为 89.59%。
{"title":"Circumventing Stragglers and Staleness in Distributed CNN using LSTM","authors":"A. Ravikumar, Harini Sriraman, Saddikuti Lokesh, Jitendra Sai","doi":"10.4108/eetiot.5119","DOIUrl":"https://doi.org/10.4108/eetiot.5119","url":null,"abstract":"INTRODUCTION: Using neural networks for these inherently distributed applications is challenging and time-consuming. There is a crucial need for a framework that supports a distributed deep neural network to yield accurate results at an accelerated time. \u0000METHODS: In the proposed framework, any experienced novice user can utilize and execute the neural network models in a distributed manner with the automated hyperparameter tuning feature. In addition, the proposed framework is provided in AWS Sage maker for scaling the distribution and achieving exascale FLOPS. We benchmarked the framework performance by applying it to a medical dataset. \u0000RESULTS: The maximum performance is achieved with a speedup of 6.59 in 5 nodes. The model encourages expert/ novice neural network users to apply neural network models in the distributed platform and get enhanced results with accelerated training time. There has been a lot of research on how to improve the training time of Convolutional Neural Networks (CNNs) using distributed models, with a particular emphasis on automating the hyperparameter tweaking process. The study shows that training times may be decreased across the board by not just manually tweaking hyperparameters, but also by using L2 regularization, a dropout layer, and ConvLSTM for automatic hyperparameter modification. \u0000CONCLUSION: The proposed method improved the training speed for model-parallel setups by 1.4% and increased the speed for parallel data by 2.206%. Data-parallel execution achieved a high accuracy of 93.3825%, whereas model-parallel execution achieved a top accuracy of 89.59%.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"116 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139837797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An internet of things based smart agriculture monitoring system using convolution neural network algorithm 使用卷积神经网络算法的基于物联网的智能农业监测系统
Pub Date : 2024-02-13 DOI: 10.4108/eetiot.5105
B. K S, Chinmaya Kumar Pradhan, Venkateswarlu A N, Harini G, Geetha P
Farming is a crucial vocation for survival on this planet because it meets the majority of people's necessities to live. However, as technology developed and the Internet of Things was created, automation (smarter technologies) began to replace old approaches, leading to a broad improvement in all fields. Currently in an automated condition where newer, smarter technologies are being upgraded daily throughout a wide range of industries, including smart homes, waste management, automobiles, industries, farming, health, grids, and more. Farmers go through significant losses as a result of the regular crop destruction caused by local animals like buffaloes, cows, goats, elephants, and others. To protect their fields, farmers have been using animal traps or electric fences. Both animals and humans perish as a result of these countless deaths. Many individuals are giving up farming because of the serious harm that animals inflict on crops. The systems now in use make it challenging to identify the animal species. Consequently, animal detection is made simple and effective by employing the Artificial Intelligence based Convolution Neural Network method. The concept of playing animal-specific sounds is by far the most accurate execution. Rotating cameras are put to good use. The percentage of animals detected by this technique has grown from 55% to 79%.
农业是地球上赖以生存的重要职业,因为它满足了大多数人的生活需要。然而,随着科技的发展和物联网的诞生,自动化(更智能的技术)开始取代旧的方法,从而使各个领域都得到了广泛的改善。目前,在自动化条件下,更新、更智能的技术每天都在升级,遍及智能家居、废物管理、汽车、工业、农业、健康、电网等各行各业。由于水牛、奶牛、山羊、大象等当地动物经常毁坏农作物,农民损失惨重。为了保护自己的田地,农民们使用动物陷阱或电网围栏。无数人和动物因此丧生。由于动物对农作物的严重危害,许多人放弃了耕作。目前使用的系统很难识别动物的种类。因此,通过采用基于人工智能的卷积神经网络方法,动物检测变得简单而有效。播放动物特定声音的概念是迄今为止最准确的执行方法。旋转摄像头也得到了很好的利用。通过这种技术检测到的动物比例从 55% 增长到 79%。
{"title":"An internet of things based smart agriculture monitoring system using convolution neural network algorithm","authors":"B. K S, Chinmaya Kumar Pradhan, Venkateswarlu A N, Harini G, Geetha P","doi":"10.4108/eetiot.5105","DOIUrl":"https://doi.org/10.4108/eetiot.5105","url":null,"abstract":"Farming is a crucial vocation for survival on this planet because it meets the majority of people's necessities to live. However, as technology developed and the Internet of Things was created, automation (smarter technologies) began to replace old approaches, leading to a broad improvement in all fields. Currently in an automated condition where newer, smarter technologies are being upgraded daily throughout a wide range of industries, including smart homes, waste management, automobiles, industries, farming, health, grids, and more. Farmers go through significant losses as a result of the regular crop destruction caused by local animals like buffaloes, cows, goats, elephants, and others. To protect their fields, farmers have been using animal traps or electric fences. Both animals and humans perish as a result of these countless deaths. Many individuals are giving up farming because of the serious harm that animals inflict on crops. The systems now in use make it challenging to identify the animal species. Consequently, animal detection is made simple and effective by employing the Artificial Intelligence based Convolution Neural Network method. The concept of playing animal-specific sounds is by far the most accurate execution. Rotating cameras are put to good use. The percentage of animals detected by this technique has grown from 55% to 79%.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"80 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139839857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An internet of things based smart agriculture monitoring system using convolution neural network algorithm 使用卷积神经网络算法的基于物联网的智能农业监测系统
Pub Date : 2024-02-13 DOI: 10.4108/eetiot.5105
B. K S, Chinmaya Kumar Pradhan, Venkateswarlu A N, Harini G, Geetha P
Farming is a crucial vocation for survival on this planet because it meets the majority of people's necessities to live. However, as technology developed and the Internet of Things was created, automation (smarter technologies) began to replace old approaches, leading to a broad improvement in all fields. Currently in an automated condition where newer, smarter technologies are being upgraded daily throughout a wide range of industries, including smart homes, waste management, automobiles, industries, farming, health, grids, and more. Farmers go through significant losses as a result of the regular crop destruction caused by local animals like buffaloes, cows, goats, elephants, and others. To protect their fields, farmers have been using animal traps or electric fences. Both animals and humans perish as a result of these countless deaths. Many individuals are giving up farming because of the serious harm that animals inflict on crops. The systems now in use make it challenging to identify the animal species. Consequently, animal detection is made simple and effective by employing the Artificial Intelligence based Convolution Neural Network method. The concept of playing animal-specific sounds is by far the most accurate execution. Rotating cameras are put to good use. The percentage of animals detected by this technique has grown from 55% to 79%.
农业是地球上赖以生存的重要职业,因为它满足了大多数人的生活需要。然而,随着科技的发展和物联网的诞生,自动化(更智能的技术)开始取代旧的方法,从而使各个领域都得到了广泛的改善。目前,在自动化条件下,更新、更智能的技术每天都在升级,遍及智能家居、废物管理、汽车、工业、农业、健康、电网等各行各业。由于水牛、奶牛、山羊、大象等当地动物经常毁坏农作物,农民损失惨重。为了保护自己的田地,农民们使用动物陷阱或电网围栏。无数人和动物因此丧生。由于动物对农作物的严重危害,许多人放弃了耕作。目前使用的系统很难识别动物的种类。因此,通过采用基于人工智能的卷积神经网络方法,动物检测变得简单而有效。播放动物特定声音的概念是迄今为止最准确的执行方法。旋转摄像头也得到了很好的利用。通过这种技术检测到的动物比例从 55% 增长到 79%。
{"title":"An internet of things based smart agriculture monitoring system using convolution neural network algorithm","authors":"B. K S, Chinmaya Kumar Pradhan, Venkateswarlu A N, Harini G, Geetha P","doi":"10.4108/eetiot.5105","DOIUrl":"https://doi.org/10.4108/eetiot.5105","url":null,"abstract":"Farming is a crucial vocation for survival on this planet because it meets the majority of people's necessities to live. However, as technology developed and the Internet of Things was created, automation (smarter technologies) began to replace old approaches, leading to a broad improvement in all fields. Currently in an automated condition where newer, smarter technologies are being upgraded daily throughout a wide range of industries, including smart homes, waste management, automobiles, industries, farming, health, grids, and more. Farmers go through significant losses as a result of the regular crop destruction caused by local animals like buffaloes, cows, goats, elephants, and others. To protect their fields, farmers have been using animal traps or electric fences. Both animals and humans perish as a result of these countless deaths. Many individuals are giving up farming because of the serious harm that animals inflict on crops. The systems now in use make it challenging to identify the animal species. Consequently, animal detection is made simple and effective by employing the Artificial Intelligence based Convolution Neural Network method. The concept of playing animal-specific sounds is by far the most accurate execution. Rotating cameras are put to good use. The percentage of animals detected by this technique has grown from 55% to 79%.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"55 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139779966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic sign recognition using CNN and Res-Net 使用 CNN 和 Res-Net 识别交通标志
Pub Date : 2024-02-12 DOI: 10.4108/eetiot.5098
J. Cruz Antony, G. M. Karpura Dheepan, Veena K, Vellanki Vikas, Vuppala Satyamitra
  In the realm of contemporary applications and everyday life, the significance of object recognition and classification cannot be overstated. A multitude of valuable domains, including G-lens technology, cancer prediction, Optical Character Recognition (OCR), Face Recognition, and more, heavily rely on the efficacy of image identification algorithms. Among these, Convolutional Neural Networks (CNN) have emerged as a cutting-edge technique that excels in its aptitude for feature extraction, offering pragmatic solutions to a diverse array of object recognition challenges. CNN's notable strength is underscored by its swifter execution, rendering it particularly advantageous for real-time processing. The domain of traffic sign recognition holds profound importance, especially in the development of practical applications like autonomous driving for vehicles such as Tesla, as well as in the realm of traffic surveillance. In this research endeavour, the focus was directed towards the Belgium Traffic Signs Dataset (BTS), an encompassing repository comprising a total of 62 distinct traffic signs. By employing a CNN model, a meticulously methodical approach was obtained commencing with a rigorous phase of data pre-processing. This preparatory stage was complemented by the strategic incorporation of residual blocks during model training, thereby enhancing the network's ability to glean intricate features from traffic sign images. Notably, our proposed methodology yielded a commendable accuracy rate of 94.25%, demonstrating the system's robust and proficient recognition capabilities. The distinctive prowess of our methodology shines through its substantial improvements in specific parameters compared to pre-existing techniques. Our approach thrives in terms of accuracy, capitalizing on CNN's rapid execution speed, and offering an efficient means of feature extraction. By effectively training on a diverse dataset encompassing 62 varied traffic signs, our model showcases a promising potential for real-world applications. The overarching analysis highlights the efficacy of our proposed technique, reaffirming its potency in achieving precise traffic sign recognition and positioning it as a viable solution for real-time scenarios and autonomous systems.
在当代应用和日常生活中,物体识别和分类的重要性无论怎样强调都不为过。包括 G-lens 技术、癌症预测、光学字符识别 (OCR)、人脸识别等在内的众多重要领域都严重依赖于图像识别算法的功效。其中,卷积神经网络(CNN)已成为一种尖端技术,在特征提取方面表现出色,为各种物体识别挑战提供了实用的解决方案。CNN 的显著优势在于其执行速度更快,特别适合实时处理。交通标志识别领域具有深远的意义,尤其是在开发自动驾驶汽车(如特斯拉)等实际应用以及交通监控领域。在这项研究工作中,重点放在了比利时交通标志数据集(BTS)上,这是一个包含 62 个不同交通标志的资料库。通过采用 CNN 模型,从严格的数据预处理阶段开始,获得了一套严谨的方法。在这一准备阶段,我们还在模型训练过程中战略性地加入了残差块,从而增强了网络从交通标志图像中收集复杂特征的能力。值得注意的是,我们提出的方法获得了令人称道的 94.25% 的准确率,证明了系统强大而熟练的识别能力。与现有技术相比,我们的方法在特定参数上有了很大改进,这充分体现了我们的独特能力。我们的方法充分利用了 CNN 的快速执行速度,并提供了一种高效的特征提取方法,从而在准确性方面取得了巨大进步。通过在包含 62 种不同交通标志的多样化数据集上进行有效训练,我们的模型展示了在现实世界中应用的巨大潜力。总体分析强调了我们提出的技术的有效性,再次证实了它在实现精确交通标志识别方面的潜力,并将其定位为实时场景和自主系统的可行解决方案。
{"title":"Traffic sign recognition using CNN and Res-Net","authors":"J. Cruz Antony, G. M. Karpura Dheepan, Veena K, Vellanki Vikas, Vuppala Satyamitra","doi":"10.4108/eetiot.5098","DOIUrl":"https://doi.org/10.4108/eetiot.5098","url":null,"abstract":"  \u0000In the realm of contemporary applications and everyday life, the significance of object recognition and classification cannot be overstated. A multitude of valuable domains, including G-lens technology, cancer prediction, Optical Character Recognition (OCR), Face Recognition, and more, heavily rely on the efficacy of image identification algorithms. Among these, Convolutional Neural Networks (CNN) have emerged as a cutting-edge technique that excels in its aptitude for feature extraction, offering pragmatic solutions to a diverse array of object recognition challenges. CNN's notable strength is underscored by its swifter execution, rendering it particularly advantageous for real-time processing. The domain of traffic sign recognition holds profound importance, especially in the development of practical applications like autonomous driving for vehicles such as Tesla, as well as in the realm of traffic surveillance. In this research endeavour, the focus was directed towards the Belgium Traffic Signs Dataset (BTS), an encompassing repository comprising a total of 62 distinct traffic signs. By employing a CNN model, a meticulously methodical approach was obtained commencing with a rigorous phase of data pre-processing. This preparatory stage was complemented by the strategic incorporation of residual blocks during model training, thereby enhancing the network's ability to glean intricate features from traffic sign images. Notably, our proposed methodology yielded a commendable accuracy rate of 94.25%, demonstrating the system's robust and proficient recognition capabilities. The distinctive prowess of our methodology shines through its substantial improvements in specific parameters compared to pre-existing techniques. Our approach thrives in terms of accuracy, capitalizing on CNN's rapid execution speed, and offering an efficient means of feature extraction. By effectively training on a diverse dataset encompassing 62 varied traffic signs, our model showcases a promising potential for real-world applications. The overarching analysis highlights the efficacy of our proposed technique, reaffirming its potency in achieving precise traffic sign recognition and positioning it as a viable solution for real-time scenarios and autonomous systems.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"48 40","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139845050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey about Post Quantum Cryptography Methods 后量子加密方法概览
Pub Date : 2024-02-12 DOI: 10.4108/eetiot.5099
Jency Rubia J, Babitha Lincy R, E. Nithila, Sherin Shibi C, Rosi A
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography prevents third party intervention over the data communication. The cryptography technology transforms the data into some other form to enhance security and robustness against the attacks. The thrust of enhancing the security among data transfer has been emerged ever since the need of Artificial Intelligence field came into a market. Therefore, modern way of computing cryptographic algorithm came into practice such as AES, 3DES, RSA, Diffie-Hellman and ECC. These public-key encryption techniques now in use are based on challenging discrete logarithms for elliptic curves and complex factorization. However, those two difficult problems can be effectively solved with the help of sufficient large-scale quantum computer. The Post Quantum Cryptography (PQC) aims to deal with an attacker who has a large-scale quantum computer. Therefore, it is essential to build a robust and secure cryptography algorithm against most vulnerable pre-quantum cryptography methods. That is called ‘Post Quantum Cryptography’. Therefore, the present crypto system needs to propose encryption key and signature size is very large.in addition to careful prediction of encryption/decryption time and amount of traffic over the communication wire is required. The post-quantum cryptography (PQC) article discusses different families of post-quantum cryptosystems, analyses the current status of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardisation process, and looks at the difficulties faced by the PQC community.
密码学是一门用其他代码隐藏重要数据或信息的艺术。它是一种确保信息和通信安全的实践和研究。因此,密码学可以防止第三方干预数据通信。密码学技术将数据转换成其他形式,以提高安全性和抵御攻击的能力。自从人工智能领域进入市场以来,提高数据传输安全性的主旨就已经出现。因此,AES、3DES、RSA、Diffie-Hellman 和 ECC 等现代计算加密算法应运而生。目前使用的这些公钥加密技术都是基于具有挑战性的椭圆曲线离散对数和复因式分解。然而,在足够大规模的量子计算机的帮助下,这两个难题可以得到有效解决。后量子密码学(PQC)旨在应对拥有大规模量子计算机的攻击者。因此,必须建立一种稳健、安全的加密算法,以对抗最脆弱的前量子加密方法。这就是所谓的 "后量子密码学"。因此,目前的密码系统需要提出非常大的加密密钥和签名大小。此外,还需要仔细预测加密/解密时间和通信线路上的流量。后量子密码学(PQC)文章讨论了不同系列的后量子密码系统,分析了美国国家标准与技术研究院(NIST)后量子密码学标准化进程的现状,并探讨了后量子密码学界面临的困难。
{"title":"A Survey about Post Quantum Cryptography Methods","authors":"Jency Rubia J, Babitha Lincy R, E. Nithila, Sherin Shibi C, Rosi A","doi":"10.4108/eetiot.5099","DOIUrl":"https://doi.org/10.4108/eetiot.5099","url":null,"abstract":"Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography prevents third party intervention over the data communication. The cryptography technology transforms the data into some other form to enhance security and robustness against the attacks. The thrust of enhancing the security among data transfer has been emerged ever since the need of Artificial Intelligence field came into a market. Therefore, modern way of computing cryptographic algorithm came into practice such as AES, 3DES, RSA, Diffie-Hellman and ECC. These public-key encryption techniques now in use are based on challenging discrete logarithms for elliptic curves and complex factorization. However, those two difficult problems can be effectively solved with the help of sufficient large-scale quantum computer. The Post Quantum Cryptography (PQC) aims to deal with an attacker who has a large-scale quantum computer. Therefore, it is essential to build a robust and secure cryptography algorithm against most vulnerable pre-quantum cryptography methods. That is called ‘Post Quantum Cryptography’. Therefore, the present crypto system needs to propose encryption key and signature size is very large.in addition to careful prediction of encryption/decryption time and amount of traffic over the communication wire is required. The post-quantum cryptography (PQC) article discusses different families of post-quantum cryptosystems, analyses the current status of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardisation process, and looks at the difficulties faced by the PQC community.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"86 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139784484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EAI Endorsed Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1