首页 > 最新文献

Big Data最新文献

英文 中文
Identification and classification of Green Leafy Vegetables using CNN models 基于CNN模型的绿叶蔬菜识别与分类
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220482
Eneia Filipe Vilanculos, T. Shongwe, Ali N. Hasan
Identifying and classifying vegetables in big farms is a challenge, especially when the vegetables are similar in colour and shape. Manual identification of vegetables takes time and is prone to errors. Therefore, the automatic classification process of the precision farming, increasingly using image processing and pattern recognition to identify fruits and vegetable, is becoming essential to identify and classify vegetables in big farms. In this paper, an automatic system for the identification and classification of green leafy vegetables, similar in colour and shape was evaluataed using five different deep learning models such as CNN, MobileNet, VGG-16, Inception V3 and ResNet 50. The accuracies of these models achieved in this paper vary from 67% to 99%. The model with the highest accuracy is the MobileNet.
在大农场里,识别和分类蔬菜是一项挑战,尤其是当蔬菜的颜色和形状相似时。人工识别蔬菜需要时间,而且容易出错。因此,精确农业的自动分类过程,越来越多地利用图像处理和模式识别来识别水果和蔬菜,成为大农场蔬菜识别和分类的必要条件。本文采用CNN、MobileNet、VGG-16、Inception V3和ResNet 50五种不同的深度学习模型,对一种颜色和形状相似的绿叶蔬菜自动识别分类系统进行了评价。这些模型的精度在67%到99%之间。精度最高的模型是MobileNet。
{"title":"Identification and classification of Green Leafy Vegetables using CNN models","authors":"Eneia Filipe Vilanculos, T. Shongwe, Ali N. Hasan","doi":"10.1109/icABCD59051.2023.10220482","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220482","url":null,"abstract":"Identifying and classifying vegetables in big farms is a challenge, especially when the vegetables are similar in colour and shape. Manual identification of vegetables takes time and is prone to errors. Therefore, the automatic classification process of the precision farming, increasingly using image processing and pattern recognition to identify fruits and vegetable, is becoming essential to identify and classify vegetables in big farms. In this paper, an automatic system for the identification and classification of green leafy vegetables, similar in colour and shape was evaluataed using five different deep learning models such as CNN, MobileNet, VGG-16, Inception V3 and ResNet 50. The accuracies of these models achieved in this paper vary from 67% to 99%. The model with the highest accuracy is the MobileNet.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"122 5","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72376715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence and State Power 人工智能与国家权力
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220459
V. Maphosa
Artificial Intelligence (AI) is increasingly ubiquitous, transforming our everyday lives. AI is expected to improve human life amid growing concerns that unregulated AI could lead to disastrous outcomes. AI algorithms have become complex and more challenging to follow. The disruptive nature of AI is seen in state power through surveillance, facial recognition, and deployment of lethal autonomous weapons systems by superpowers. This review paper analyses how AI is deployed for state power to enhance policing and military operations. AI deployment by the police and army increases operational excellence and efficiency and offers simulated training, and predictive capabilities, while unregulated use raises ethical and human rights violations. Given the foreseeable pervasiveness and rapid AI development, more research is required to restrict coercive state power. This review paper raises awareness of AI's affordances and contributes to emergent literature on constraints and ethical and legal issues. It raises interest among scholars, policymakers, and practitioners for collaborative research. AI will reinforce the technology divide as developing countries face infrastructural, financial and digital skills barriers. The review concludes with future research implications.
人工智能(AI)越来越无处不在,正在改变我们的日常生活。人们越来越担心,不受监管的人工智能可能导致灾难性的后果,预计人工智能将改善人类的生活。人工智能算法变得越来越复杂,越来越难以理解。超级大国通过监视、面部识别和部署致命的自主武器系统,在国家权力中看到了人工智能的破坏性。这篇综述文章分析了人工智能如何被部署到国家权力中,以加强警务和军事行动。警察和军队部署人工智能提高了行动的卓越性和效率,并提供了模拟训练和预测能力,而不受管制的使用则会引发违反道德和人权的行为。鉴于人工智能的可预见的普遍性和快速发展,需要更多的研究来限制强制性的国家权力。这篇综述文章提高了人们对人工智能的能力的认识,并为约束和伦理和法律问题的新兴文献做出了贡献。它引起了学者、政策制定者和实践者对合作研究的兴趣。随着发展中国家面临基础设施、金融和数字技能壁垒,人工智能将加剧技术鸿沟。本文总结了未来研究的启示。
{"title":"Artificial Intelligence and State Power","authors":"V. Maphosa","doi":"10.1109/icABCD59051.2023.10220459","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220459","url":null,"abstract":"Artificial Intelligence (AI) is increasingly ubiquitous, transforming our everyday lives. AI is expected to improve human life amid growing concerns that unregulated AI could lead to disastrous outcomes. AI algorithms have become complex and more challenging to follow. The disruptive nature of AI is seen in state power through surveillance, facial recognition, and deployment of lethal autonomous weapons systems by superpowers. This review paper analyses how AI is deployed for state power to enhance policing and military operations. AI deployment by the police and army increases operational excellence and efficiency and offers simulated training, and predictive capabilities, while unregulated use raises ethical and human rights violations. Given the foreseeable pervasiveness and rapid AI development, more research is required to restrict coercive state power. This review paper raises awareness of AI's affordances and contributes to emergent literature on constraints and ethical and legal issues. It raises interest among scholars, policymakers, and practitioners for collaborative research. AI will reinforce the technology divide as developing countries face infrastructural, financial and digital skills barriers. The review concludes with future research implications.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"20 1","pages":"1-5"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78064363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Resources Allocation Scheme For Joint Optical Wireless Transport Networks 一种联合无线光传输网络的资源分配方案
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220537
Mlungisi Molefe, K. Sibiya, B. Nleya
As the future of networking dives into a new era of connecting every single physical device into the internet termed Internet of Things (loT), this significantly means a rapid increase in the number of online connected devices, which leads to more bandwidth hungry and data consuming devices. The fifth generation (5G) of mobile communication has been deployed already in multiple countries, therefore researchers have migrated their focus to the sixth generation (6G) of mobile communication to cater for extensive coverage and massive number of loT devices. A promising architecture and technology to cope with massive number of online devices and extensive coverage is a joint optical wireless transport network which offers comparably ultra-high systems capacity and extremely low latency while maintaining an improved quality of service. Furthermore, an optical wireless transport network can accommodate high speed mobility for frequently moving end user devices which is essential for 6G. In this paper our focus is to explore and propose an ultimate optical wireless transport network architecture scheme that will cater for loT as well as networks beyond 5G. We thus propose an innovative Optical-Backhaul and Wireless Access (OBWA) network architecture as a favorable solution for future networks. We further present a joint channel and route allocation (JCRA) scheme for achieving optimal quality of experience. Performance evaluation of the proposed JCRA scheme for OBW A network architecture show a significant improvement in the network throughput as well as the network end-to-end delay despite varying load traffic or varying flow channels.
随着网络的未来进入一个将每个物理设备连接到互联网的新时代,即物联网(loT),这意味着在线连接设备的数量将迅速增加,这将导致更多的带宽消耗和数据消耗设备。第五代(5G)移动通信已经在多个国家部署,因此研究人员将重点转移到第六代(6G)移动通信上,以满足广泛覆盖和大量loT设备的需求。联合光无线传输网络是一种很有前途的架构和技术,可以处理大量的在线设备和广泛的覆盖范围,它在保持改进的服务质量的同时提供相对超高的系统容量和极低的延迟。此外,光无线传输网络可以为频繁移动的终端用户设备提供高速移动性,这对6G至关重要。在本文中,我们的重点是探索和提出一个最终的光无线传输网络架构方案,以满足loT以及5G以上的网络。因此,我们提出了一种创新的光回程和无线接入(OBWA)网络架构,作为未来网络的有利解决方案。我们进一步提出了一种联合信道和路由分配(JCRA)方案,以实现最佳的体验质量。基于OBW - A网络架构的JCRA方案的性能评估表明,在不同负载流量或不同流通道的情况下,该方案在网络吞吐量和网络端到端延迟方面都有显著改善。
{"title":"A Resources Allocation Scheme For Joint Optical Wireless Transport Networks","authors":"Mlungisi Molefe, K. Sibiya, B. Nleya","doi":"10.1109/icABCD59051.2023.10220537","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220537","url":null,"abstract":"As the future of networking dives into a new era of connecting every single physical device into the internet termed Internet of Things (loT), this significantly means a rapid increase in the number of online connected devices, which leads to more bandwidth hungry and data consuming devices. The fifth generation (5G) of mobile communication has been deployed already in multiple countries, therefore researchers have migrated their focus to the sixth generation (6G) of mobile communication to cater for extensive coverage and massive number of loT devices. A promising architecture and technology to cope with massive number of online devices and extensive coverage is a joint optical wireless transport network which offers comparably ultra-high systems capacity and extremely low latency while maintaining an improved quality of service. Furthermore, an optical wireless transport network can accommodate high speed mobility for frequently moving end user devices which is essential for 6G. In this paper our focus is to explore and propose an ultimate optical wireless transport network architecture scheme that will cater for loT as well as networks beyond 5G. We thus propose an innovative Optical-Backhaul and Wireless Access (OBWA) network architecture as a favorable solution for future networks. We further present a joint channel and route allocation (JCRA) scheme for achieving optimal quality of experience. Performance evaluation of the proposed JCRA scheme for OBW A network architecture show a significant improvement in the network throughput as well as the network end-to-end delay despite varying load traffic or varying flow channels.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"28 1","pages":"1-7"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84572092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease Motivated Model for Future Dynamic Computing 未来动态计算的疾病驱动模型
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220487
Dephney Mathebula
Future computing entities should be capable of accessing computing resources for data-intensive algorithm execution. This should be realizable in operational contexts where internet accessibility to cloud contexts becomes challenging. Such a scenario describes developing contexts. In addition, future computing entities also make use of multiple operating systems in a context where the computing resources are reduced due to the use of partitions. The use of partitions is recognized to reduce the number of accessible computing resources and increase the overhead associated with computing resource allocation. The presented research proposes an architecture where an operating system is logically stowed and selectively activated without involving the use of partition. This frees up the number of computing resources previously locked in different partition systems and reduces the computing resource overhead. Analysis shows that the proposed framework increases the accessible computing resources by 14.6% on average. In addition, the computing resource overhead is reduced by 21 % on average.
未来的计算实体应该能够访问执行数据密集型算法的计算资源。在云环境的互联网可访问性变得具有挑战性的操作环境中,这应该是可以实现的。这样的场景描述了开发环境。此外,未来的计算实体还会在由于使用分区而减少计算资源的上下文中使用多个操作系统。使用分区可以减少可访问计算资源的数量,并增加与计算资源分配相关的开销。本研究提出了一种架构,其中操作系统在逻辑上存储并选择性地激活,而不涉及使用分区。这释放了以前锁定在不同分区系统中的计算资源的数量,并减少了计算资源开销。分析表明,该框架平均增加了14.6%的可访问计算资源。此外,计算资源开销平均减少了21%。
{"title":"Disease Motivated Model for Future Dynamic Computing","authors":"Dephney Mathebula","doi":"10.1109/icABCD59051.2023.10220487","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220487","url":null,"abstract":"Future computing entities should be capable of accessing computing resources for data-intensive algorithm execution. This should be realizable in operational contexts where internet accessibility to cloud contexts becomes challenging. Such a scenario describes developing contexts. In addition, future computing entities also make use of multiple operating systems in a context where the computing resources are reduced due to the use of partitions. The use of partitions is recognized to reduce the number of accessible computing resources and increase the overhead associated with computing resource allocation. The presented research proposes an architecture where an operating system is logically stowed and selectively activated without involving the use of partition. This frees up the number of computing resources previously locked in different partition systems and reduces the computing resource overhead. Analysis shows that the proposed framework increases the accessible computing resources by 14.6% on average. In addition, the computing resource overhead is reduced by 21 % on average.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"32 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89283720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Network Management with Software Defined Networking using OpenFlow Protocol 使用OpenFlow协议改进软件定义网络的网络管理
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220519
Koketso Molemane Rodney Mokoena, Ramahlapane Lerato Moila, Prof Mthulisi Velempini
With the advancement of network-based devices, resulting in communication networks also growing rapidly and becoming more complex, resulting in large and heterogeneous network architecture has brought a lot of challenges in network management. Therefore, managing the network has become an increasingly a challenge given the existing network architectures. In this study, we have investigated how network operators operate, maintain and secure telecommunications networks. The study has also investigated the effectiveness of Software Defined Networking (SDN) in improving network management. The study has also investigated how the architecture minimizes the challenges users face. To improve network management with SDN using the OpenFlow protocol, we created network topologies and configured devices using the graphical network simulator 3, Oracle VM VirtualBox Manager, and Mininet VM. Our approach implemented both Git and Ansible in a centralized network architecture to solve the problems facing existing network architectures with the rapid growth of network-based devices on the Internet. This research paper has shown how to use Ansible playbooks to manage your network and overcome the challenges you face. The simulation results shows that the proposed scheme performs better in terms of efficiency and flexibility than the traditional OpenFlow protocol. These improvements have been achieved through the separation of the control and data planes, allowing for more centralized network management and easier implementation of network policies.
随着网络设备的进步,导致通信网络也在快速增长并变得越来越复杂,导致网络架构的庞大和异构给网络管理带来了很多挑战。因此,在现有的网络体系结构下,管理网络已成为一项日益严峻的挑战。在这项研究中,我们调查了网络运营商如何运营、维护和保护电信网络。该研究还调查了软件定义网络(SDN)在改善网络管理方面的有效性。该研究还调查了架构如何最大限度地减少用户面临的挑战。为了使用OpenFlow协议改进SDN的网络管理,我们使用图形网络模拟器3、Oracle VM VirtualBox Manager和Mininet VM创建了网络拓扑并配置了设备。我们的方法在一个集中的网络架构中实现了Git和Ansible,以解决现有网络架构在Internet上基于网络的设备快速增长所面临的问题。这篇研究论文展示了如何使用Ansible剧本来管理你的网络并克服你所面临的挑战。仿真结果表明,该方案在效率和灵活性方面都优于传统的OpenFlow协议。这些改进是通过分离控制平面和数据平面实现的,从而允许更集中的网络管理和更容易地实现网络策略。
{"title":"Improving Network Management with Software Defined Networking using OpenFlow Protocol","authors":"Koketso Molemane Rodney Mokoena, Ramahlapane Lerato Moila, Prof Mthulisi Velempini","doi":"10.1109/icABCD59051.2023.10220519","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220519","url":null,"abstract":"With the advancement of network-based devices, resulting in communication networks also growing rapidly and becoming more complex, resulting in large and heterogeneous network architecture has brought a lot of challenges in network management. Therefore, managing the network has become an increasingly a challenge given the existing network architectures. In this study, we have investigated how network operators operate, maintain and secure telecommunications networks. The study has also investigated the effectiveness of Software Defined Networking (SDN) in improving network management. The study has also investigated how the architecture minimizes the challenges users face. To improve network management with SDN using the OpenFlow protocol, we created network topologies and configured devices using the graphical network simulator 3, Oracle VM VirtualBox Manager, and Mininet VM. Our approach implemented both Git and Ansible in a centralized network architecture to solve the problems facing existing network architectures with the rapid growth of network-based devices on the Internet. This research paper has shown how to use Ansible playbooks to manage your network and overcome the challenges you face. The simulation results shows that the proposed scheme performs better in terms of efficiency and flexibility than the traditional OpenFlow protocol. These improvements have been achieved through the separation of the control and data planes, allowing for more centralized network management and easier implementation of network policies.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"33 1","pages":"1-5"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87963992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topic Classification of Tweets in the Broadcasting Domain using Machine Learning Methods 基于机器学习方法的广播领域推文主题分类
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220553
T. Sefara, Mapitsi Rangata
Twitter is one of the microblogging sites with millions of daily users. Broadcast companies use Twitter to share short messages to engage or share opinions about a particular topic or product. With a large number of conversations available on Twitter, it is difficult to identify the category of topics in the broadcasting domain. This paper proposes the use of unsupervised learning to generate topics from unlabelled tweet data sets in the broadcasting domain using the latent Dirichlet allocation (LDA) method. Approximately six groups of topics were generated and each group was assigned a label or category. These labels were used to label the data by finding the dominating label in each tweet as the main category. Supervised learning was conducted to train six machine learning models which are multinomial logistic regression, XGBoost, decision trees, random forest, support vector machines, and multilayer perceptron (MLP). The models were able to learn from the data to predict the category of each tweet from the testing data. The models were evaluated using accuracy and the f1 score. Linear support vector machine and MLP obtained better classi-fication results compared to other trained models.
Twitter是拥有数百万日用户的微博网站之一。广播公司使用Twitter来分享短消息,以参与或分享对特定主题或产品的看法。由于Twitter上有大量的对话,很难确定广播领域的主题类别。本文提出使用无监督学习,利用潜在狄利克雷分配(latent Dirichlet allocation, LDA)方法从广播域的未标记推文数据集生成主题。大约产生了六组主题,每组都分配了一个标签或类别。这些标签通过在每条tweet中找到占主导地位的标签作为主要类别来标记数据。采用监督学习方法训练了多项逻辑回归、XGBoost、决策树、随机森林、支持向量机和多层感知机(MLP) 6个机器学习模型。这些模型能够从数据中学习,从测试数据中预测每条推文的类别。采用精度和f1评分对模型进行评价。与其他训练模型相比,线性支持向量机和MLP获得了更好的分类效果。
{"title":"Topic Classification of Tweets in the Broadcasting Domain using Machine Learning Methods","authors":"T. Sefara, Mapitsi Rangata","doi":"10.1109/icABCD59051.2023.10220553","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220553","url":null,"abstract":"Twitter is one of the microblogging sites with millions of daily users. Broadcast companies use Twitter to share short messages to engage or share opinions about a particular topic or product. With a large number of conversations available on Twitter, it is difficult to identify the category of topics in the broadcasting domain. This paper proposes the use of unsupervised learning to generate topics from unlabelled tweet data sets in the broadcasting domain using the latent Dirichlet allocation (LDA) method. Approximately six groups of topics were generated and each group was assigned a label or category. These labels were used to label the data by finding the dominating label in each tweet as the main category. Supervised learning was conducted to train six machine learning models which are multinomial logistic regression, XGBoost, decision trees, random forest, support vector machines, and multilayer perceptron (MLP). The models were able to learn from the data to predict the category of each tweet from the testing data. The models were evaluated using accuracy and the f1 score. Linear support vector machine and MLP obtained better classi-fication results compared to other trained models.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"61 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74084993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Management and Monitoring of Livestock in the Farm Using Deep Learning 利用深度学习对农场牲畜进行管理和监测
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220556
Makhabane Molapo, Chunling Tu, Deao Du Plessis, Shengzhi Du
Livestock management and monitoring system play a crucial role in farm operations. This paper proposes a system for the management and monitoring of livestock on a farm using deep learning techniques. Traditional methods of monitoring livestock involve manual observation, which can be time-consuming and unreliable. Various systems have been developed, however, there are still challenges existing in present livestock classification and counting, including occlusion, animal overlapping, shadow, etc. To improve all these challenges, this paper presents a monitoring system of livestock under different conditions by the end-to-end deep learning model of You Only Look Once version 5 (YOLOv5). The suggested model conducts feature extraction on the original image with the original YOLOv5 backbone network and detects livestock of different sizes for counting on each anchor frame. Additionally, this model identifies and tracks individual animals The Kaggle dataset collected in real-time containing different animals is used as YOLOv5 relies heavily on data augmentation to improve its detection and tracking performance and validate the proposed system. The scaling, resizing, and manipulation of the splitting dataset are done by the Roboflow application. Additionally, this paper seeks to demonstrate the latest research in utilizing Faster Regional convolutional neural networks (R-CNN) and compare its backbones with the original YOLOv5 backbone. The tensor board graphs from Colab show that this proposed system outperformed other R-CNN, achieving an accuracy of 93% on mAP@_0.5%, making it a promising option for intelligent farm monitoring and managing.
牲畜管理和监测系统在农场经营中起着至关重要的作用。本文提出了一个使用深度学习技术管理和监测农场牲畜的系统。传统的牲畜监测方法涉及人工观察,既费时又不可靠。虽然已经开发出了各种系统,但目前的家畜分类和计数仍然存在一些挑战,包括遮挡、动物重叠、阴影等。为了改善这些挑战,本文提出了一个基于端到端深度学习模型的不同条件下牲畜监测系统You Only Look Once version 5 (YOLOv5)。该模型利用原始的YOLOv5骨干网对原始图像进行特征提取,检测不同大小的牲畜在每个锚帧上计数。此外,该模型还可以识别和跟踪单个动物。由于YOLOv5在很大程度上依赖于数据增强来提高其检测和跟踪性能并验证所提出的系统,因此使用了实时收集的包含不同动物的Kaggle数据集。分割数据集的缩放、调整大小和操作由Roboflow应用程序完成。此外,本文试图展示利用更快区域卷积神经网络(R-CNN)的最新研究,并将其主干与原始的YOLOv5主干进行比较。来自Colab的张量板图显示,该系统优于其他R-CNN,在mAP@_0.5%上达到93%的准确率,使其成为智能农场监控和管理的一个有前途的选择。
{"title":"Management and Monitoring of Livestock in the Farm Using Deep Learning","authors":"Makhabane Molapo, Chunling Tu, Deao Du Plessis, Shengzhi Du","doi":"10.1109/icABCD59051.2023.10220556","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220556","url":null,"abstract":"Livestock management and monitoring system play a crucial role in farm operations. This paper proposes a system for the management and monitoring of livestock on a farm using deep learning techniques. Traditional methods of monitoring livestock involve manual observation, which can be time-consuming and unreliable. Various systems have been developed, however, there are still challenges existing in present livestock classification and counting, including occlusion, animal overlapping, shadow, etc. To improve all these challenges, this paper presents a monitoring system of livestock under different conditions by the end-to-end deep learning model of You Only Look Once version 5 (YOLOv5). The suggested model conducts feature extraction on the original image with the original YOLOv5 backbone network and detects livestock of different sizes for counting on each anchor frame. Additionally, this model identifies and tracks individual animals The Kaggle dataset collected in real-time containing different animals is used as YOLOv5 relies heavily on data augmentation to improve its detection and tracking performance and validate the proposed system. The scaling, resizing, and manipulation of the splitting dataset are done by the Roboflow application. Additionally, this paper seeks to demonstrate the latest research in utilizing Faster Regional convolutional neural networks (R-CNN) and compare its backbones with the original YOLOv5 backbone. The tensor board graphs from Colab show that this proposed system outperformed other R-CNN, achieving an accuracy of 93% on mAP@_0.5%, making it a promising option for intelligent farm monitoring and managing.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"6 1","pages":"1-6"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79674554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using an Exploratory Analytical Approach to Distinguish the Habits of Graduating and Non-Graduating Students in a Virtual Learning Environment 运用探索性分析方法区分虚拟学习环境中毕业生和非毕业生的习惯
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220542
Fati Tahiru, Steven. Parbanath
Understanding student behaviour is crucial for creating personalised learning and other interventions. Educational stakeholders continue investigating diverse solutions to improve student learning behaviour in higher educational institutions. One solution that stands out is to gain insights and identify the trends and patterns in data about students learning behaviour for decision-making. Exploratory Data Analysis (EDA) is a method for analysing and summarising data in order to get insights and recognise patterns or trends about an entity. This study seeks to utilise Exploratory Data Analysis to analyse students' logs in the virtual learning environment to distinguish the characteristics/habits of students who graduate and students who do not graduate from higher educational institutions. The process flow for implementing EDA can act as a helpful guide for educational stakeholders. The study findings indicate that the revision trend of graduated students is much more frequent than that of non-graduated students. However, there were no differences in habits in the early access to the learning materials before the start of the program. Academic stakeholders can utilise the approach to enable them to make better decisions when assessing students' behaviour and trends in the virtual environment.
了解学生的行为对于创建个性化学习和其他干预措施至关重要。教育利益相关者继续研究各种解决方案,以改善高等教育机构的学生学习行为。一个突出的解决方案是,从学生学习行为的数据中获得洞察力,并确定趋势和模式,以供决策。探索性数据分析(EDA)是一种分析和总结数据的方法,目的是洞察和识别实体的模式或趋势。本研究试图利用探索性数据分析来分析学生在虚拟学习环境中的日志,以区分毕业和未毕业的学生的特征/习惯。实现EDA的流程流可以作为教育涉众的有用指南。研究结果表明,大学毕业生的复习趋势明显高于非大学毕业生。然而,在项目开始前,在早期接触学习材料的习惯上没有差异。学术利益相关者可以利用这种方法,使他们在评估学生在虚拟环境中的行为和趋势时做出更好的决策。
{"title":"Using an Exploratory Analytical Approach to Distinguish the Habits of Graduating and Non-Graduating Students in a Virtual Learning Environment","authors":"Fati Tahiru, Steven. Parbanath","doi":"10.1109/icABCD59051.2023.10220542","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220542","url":null,"abstract":"Understanding student behaviour is crucial for creating personalised learning and other interventions. Educational stakeholders continue investigating diverse solutions to improve student learning behaviour in higher educational institutions. One solution that stands out is to gain insights and identify the trends and patterns in data about students learning behaviour for decision-making. Exploratory Data Analysis (EDA) is a method for analysing and summarising data in order to get insights and recognise patterns or trends about an entity. This study seeks to utilise Exploratory Data Analysis to analyse students' logs in the virtual learning environment to distinguish the characteristics/habits of students who graduate and students who do not graduate from higher educational institutions. The process flow for implementing EDA can act as a helpful guide for educational stakeholders. The study findings indicate that the revision trend of graduated students is much more frequent than that of non-graduated students. However, there were no differences in habits in the early access to the learning materials before the start of the program. Academic stakeholders can utilise the approach to enable them to make better decisions when assessing students' behaviour and trends in the virtual environment.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"187 1","pages":"1-8"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80670616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Electoral Vote Counting Solutions: A Comparative Analysis of Methods, Constraints, and Approaches 区块链选举计票解决方案:方法、约束和途径的比较分析
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220467
Patrick Mwansa, Boniface Kabaso
Blockchain technology in electronic voting has emerged as an alternative to other electronic and paper-based voting systems to minimize inconsistencies and redundancies. However, past experiences indicate limited success due to scalability, speed, and privacy issues. This systematic literature review examines the methods, constraints, and approaches in the existing literature on blockchain-based electoral vote-counting solutions. A thorough search of pertinent databases was performed, and selected studies were assessed based on predefined inclusion and exclusion criteria. The review's findings reveal that most existing solutions employ smart contracts and various cryptographic algorithms to create secure and transparent voting systems. However, the study also pinpoints areas that require improvement, such as scalability, privacy, and accessibility. The review recommends exploring different combinations of blockchain platforms, cryptographic algorithms, and programming languages to develop secure and transparent voting systems. Additionally, future research could investigate the potential benefits and challenges of incorporating Internet of Things (IoT) devices, consensus mechanisms, and other technologies into the voting process. The review concludes that more research is needed to enhance the security and transparency of blockchain-based voting systems.
电子投票中的区块链技术已经成为其他电子和纸质投票系统的替代品,以最大限度地减少不一致和冗余。然而,过去的经验表明,由于可伸缩性、速度和隐私问题,成功有限。这篇系统的文献综述研究了基于区块链的选举计票解决方案的现有文献中的方法、约束和方法。对相关数据库进行了彻底的搜索,并根据预定义的纳入和排除标准对选定的研究进行了评估。审查的结果显示,大多数现有的解决方案都采用智能合约和各种加密算法来创建安全透明的投票系统。然而,该研究也指出了需要改进的领域,如可扩展性、隐私性和可访问性。该审查建议探索区块链平台、加密算法和编程语言的不同组合,以开发安全透明的投票系统。此外,未来的研究可以调查将物联网(IoT)设备、共识机制和其他技术纳入投票过程的潜在好处和挑战。该审查的结论是,需要更多的研究来提高基于区块链的投票系统的安全性和透明度。
{"title":"Blockchain Electoral Vote Counting Solutions: A Comparative Analysis of Methods, Constraints, and Approaches","authors":"Patrick Mwansa, Boniface Kabaso","doi":"10.1109/icABCD59051.2023.10220467","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220467","url":null,"abstract":"Blockchain technology in electronic voting has emerged as an alternative to other electronic and paper-based voting systems to minimize inconsistencies and redundancies. However, past experiences indicate limited success due to scalability, speed, and privacy issues. This systematic literature review examines the methods, constraints, and approaches in the existing literature on blockchain-based electoral vote-counting solutions. A thorough search of pertinent databases was performed, and selected studies were assessed based on predefined inclusion and exclusion criteria. The review's findings reveal that most existing solutions employ smart contracts and various cryptographic algorithms to create secure and transparent voting systems. However, the study also pinpoints areas that require improvement, such as scalability, privacy, and accessibility. The review recommends exploring different combinations of blockchain platforms, cryptographic algorithms, and programming languages to develop secure and transparent voting systems. Additionally, future research could investigate the potential benefits and challenges of incorporating Internet of Things (IoT) devices, consensus mechanisms, and other technologies into the voting process. The review concludes that more research is needed to enhance the security and transparency of blockchain-based voting systems.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"1 1","pages":"1-10"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77640701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model for Cyber Threat Intelligence for Organisations 组织网络威胁情报模型
IF 4.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-03 DOI: 10.1109/icABCD59051.2023.10220503
Z. C. Khan, Thulile Mkhwanazi, M. Masango
As cyber attacks are increasing in South Africa, organisations need to strengthen cyber security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity program but is often overlooked. It can assist to identify future and potential cyber threats. Organisations process large volumes of data containing Cyber Threat Intelligence, but this is often not collected, processed, or considered as Cyber Threat Intelligence. South African organizations will continue to feel the repercussions of cyber-attacks if actions are not taken. To bring clarity and allow South African organizations to leverage on Cyber Threat Intelligence, this work aims to categorize Cyber Threat Intelligence for organizations. Several characteristics of Cyber Threat Intelligence are discussed, and thereafter a model is presented. The applicability of this model is demonstrated by a short use-case.
随着南非的网络攻击日益增多,企业需要加强网络安全控制。网络威胁情报是网络安全计划的重要组成部分,但往往被忽视。它可以帮助识别未来和潜在的网络威胁。组织处理大量包含网络威胁情报的数据,但这些数据通常不会被收集、处理或视为网络威胁情报。如果不采取行动,南非组织将继续感受到网络攻击的影响。为了使南非组织能够更清晰地利用网络威胁情报,本工作旨在为组织对网络威胁情报进行分类。讨论了网络威胁情报的几个特点,提出了网络威胁情报模型。这个模型的适用性通过一个简短的用例来证明。
{"title":"A Model for Cyber Threat Intelligence for Organisations","authors":"Z. C. Khan, Thulile Mkhwanazi, M. Masango","doi":"10.1109/icABCD59051.2023.10220503","DOIUrl":"https://doi.org/10.1109/icABCD59051.2023.10220503","url":null,"abstract":"As cyber attacks are increasing in South Africa, organisations need to strengthen cyber security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity program but is often overlooked. It can assist to identify future and potential cyber threats. Organisations process large volumes of data containing Cyber Threat Intelligence, but this is often not collected, processed, or considered as Cyber Threat Intelligence. South African organizations will continue to feel the repercussions of cyber-attacks if actions are not taken. To bring clarity and allow South African organizations to leverage on Cyber Threat Intelligence, this work aims to categorize Cyber Threat Intelligence for organizations. Several characteristics of Cyber Threat Intelligence are discussed, and thereafter a model is presented. The applicability of this model is demonstrated by a short use-case.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":"47 1","pages":"1-7"},"PeriodicalIF":4.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73718574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Big Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1