首页 > 最新文献

物联网技术最新文献

英文 中文
Design of Shark Detection and Decoy Buoys 鲨鱼探测和诱饵浮标的设计
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053408
Abhishek Sebastian, Pragna R, G. S, A. R
Humans and wildlife negatively interact when there is a loss of property, livelihood, or even life; this interaction is referred to as a human-wildlife conflict. Defensive and retaliatory killing may lead to the eventual extinction of these species. One such conflict occasionally occurs near coastal areas between cold-blooded saline water creatures like sharks and people. This work presents a proof of concept for developing a buoy that can detect cold-blooded predators and serve as a decoy system to deter human attacks. The decoy system is based on numerous biological facts and information about shark species. The model can detect up to 14 species of sharks and saline crocodiles using pattern recognition with a collective accuracy of 92%. The designed buoy is a novel approach to prevent human attacks near the coast with its decoy system based on the factual behavior of the predatory shark species and crocodiles.
当财产、生计甚至生命遭受损失时,人类和野生动物会产生负面互动;这种相互作用被称为人类与野生动物的冲突。防御性和报复性的杀戮可能最终导致这些物种的灭绝。一种这样的冲突偶尔会发生在靠近沿海地区的冷血咸水生物之间,比如鲨鱼和人。这项工作提出了开发一种浮标的概念证明,这种浮标可以探测到冷血食肉动物,并作为诱饵系统来阻止人类的攻击。诱饵系统是基于大量关于鲨鱼种类的生物学事实和信息。该模型可以通过模式识别检测到多达14种鲨鱼和咸水鳄,总体准确率达到92%。设计的浮标是一种基于掠食性鲨鱼和鳄鱼的实际行为的诱饵系统来防止海岸附近人类袭击的新方法。
{"title":"Design of Shark Detection and Decoy Buoys","authors":"Abhishek Sebastian, Pragna R, G. S, A. R","doi":"10.1109/IDCIoT56793.2023.10053408","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053408","url":null,"abstract":"Humans and wildlife negatively interact when there is a loss of property, livelihood, or even life; this interaction is referred to as a human-wildlife conflict. Defensive and retaliatory killing may lead to the eventual extinction of these species. One such conflict occasionally occurs near coastal areas between cold-blooded saline water creatures like sharks and people. This work presents a proof of concept for developing a buoy that can detect cold-blooded predators and serve as a decoy system to deter human attacks. The decoy system is based on numerous biological facts and information about shark species. The model can detect up to 14 species of sharks and saline crocodiles using pattern recognition with a collective accuracy of 92%. The designed buoy is a novel approach to prevent human attacks near the coast with its decoy system based on the factual behavior of the predatory shark species and crocodiles.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74144491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circumvolution of Centre Pixel Algorithm in Pixel Value Differencing Steganography Model in the Spatial Domain 空间域像素值差分隐写模型中中心像素的旋转算法
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053536
K. S. Suresh, T. Kamalakannan
Sending and receiving sensitive information through any data channel is always a challenging task because of the enormous proliferation of the computer industry. Since steganography algorithms are routinely used to share data, cryptography algorithms have been around for the same objective for a long time, but these cryptographic algorithms are easily brute-forced. Furthermore, more research works have been focused on Steganography models. Initially, steganography models start with a simple LSB data insertion model, which accepts only a limited payload and is easily vulnerable. The PVD algorithms encapsulate more data than conventional LSB approaches whereas still affording a reasonable level of protection to private data. In order to find the set of pixels that can safely store more data bits using circumvolution of the centre pixel algorithm in the PVD domain. This model can embed more data bits when compared with the conventional LSB models. The Confidential data is protected with excellent security with double- layered information hiding. The suggested approach achieves good PSNR and MSE scores and keeps up great quality when more data is added to the stego-image.
由于计算机工业的巨大发展,通过任何数据通道发送和接收敏感信息一直是一项具有挑战性的任务。由于隐写算法通常用于共享数据,加密算法已经为相同的目标存在了很长时间,但这些加密算法很容易被暴力破解。此外,越来越多的研究工作集中在隐写模型上。最初,隐写模型从一个简单的LSB数据插入模型开始,该模型只接受有限的有效载荷,并且很容易受到攻击。PVD算法比传统的LSB方法封装了更多的数据,同时仍然为私有数据提供了合理的保护级别。为了找到能够在PVD域内安全地存储更多数据位的像素集,采用中心像素的旋转算法。与传统的LSB模型相比,该模型可以嵌入更多的数据位。机密数据采用双层信息隐藏,具有良好的安全性。该方法获得了较好的PSNR和MSE分数,并且在添加更多数据到隐写图像时仍能保持较高的质量。
{"title":"Circumvolution of Centre Pixel Algorithm in Pixel Value Differencing Steganography Model in the Spatial Domain","authors":"K. S. Suresh, T. Kamalakannan","doi":"10.1109/IDCIoT56793.2023.10053536","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053536","url":null,"abstract":"Sending and receiving sensitive information through any data channel is always a challenging task because of the enormous proliferation of the computer industry. Since steganography algorithms are routinely used to share data, cryptography algorithms have been around for the same objective for a long time, but these cryptographic algorithms are easily brute-forced. Furthermore, more research works have been focused on Steganography models. Initially, steganography models start with a simple LSB data insertion model, which accepts only a limited payload and is easily vulnerable. The PVD algorithms encapsulate more data than conventional LSB approaches whereas still affording a reasonable level of protection to private data. In order to find the set of pixels that can safely store more data bits using circumvolution of the centre pixel algorithm in the PVD domain. This model can embed more data bits when compared with the conventional LSB models. The Confidential data is protected with excellent security with double- layered information hiding. The suggested approach achieves good PSNR and MSE scores and keeps up great quality when more data is added to the stego-image.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72490629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Hydroponics System to Study Nutrient Allocation and Plant Responses in a Controlled Environment 自动水培系统在受控环境下研究养分分配和植物反应
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053508
S. P., Devadathan Menon, Dhruv Sharma, Ayush Dadsena
In nations like India, where agricultural production is the largest source of revenue, agriculture is troubled by many issues like limited and divided farmland/cultivation lands, manures, chemical fertilizer, pesticides, and seeds etc. Adding on, even the water resources fall short, which makes agriculture even more difficult and challenging. But with the increase in the rate of consumers as well as increase in their health consciousness, leads to the demand for quality and quantity of chemical-free agricultural products. Hence technology can come into the picture to resolve these issues. This article proposes a solution to solve the above-mentioned difficulties by using hydroponics along with IoT where hydroponics is a way of cultivating agricultural products that end up saving more water as well as can grow the plants in small areas when compared with traditional methods of farming. It can be done in any unoccupied space in the house or anywhere, such as a room, lobby, patio, balcony, or any other unused space. So hydroponics results in higher yield of crops when controlled and efficiently monitored, growth of the plants can be monitored from anywhere in the world using IoT so it is time saving. The hydroponics with IoT model can also be modified into a vertical fashion. This model allows people to go organic and eat chemical /pesticide free food.
在像印度这样的国家,农业生产是最大的收入来源,农业受到许多问题的困扰,比如有限和划分的农田/耕地、肥料、化肥、杀虫剂和种子等。再加上水资源短缺,这使得农业更加困难和具有挑战性。但随着消费者消费比例的提高以及健康意识的增强,导致对无化学产品的质量和数量的需求。因此,技术可以解决这些问题。本文提出了一种解决上述困难的方法,通过水培和物联网的结合,水培是一种种植农产品的方式,与传统的耕作方式相比,水培最终节省了更多的水,并且可以在小面积种植植物。它可以在房子里任何未占用的空间或任何地方进行,比如房间、大厅、露台、阳台或任何其他未使用的空间。因此,水培法在控制和有效监测时可以提高作物产量,植物的生长可以使用物联网从世界任何地方进行监测,因此节省了时间。物联网水培模型也可以修改为垂直方式。这种模式允许人们选择有机食品,吃不含化学/农药的食物。
{"title":"Automated Hydroponics System to Study Nutrient Allocation and Plant Responses in a Controlled Environment","authors":"S. P., Devadathan Menon, Dhruv Sharma, Ayush Dadsena","doi":"10.1109/IDCIoT56793.2023.10053508","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053508","url":null,"abstract":"In nations like India, where agricultural production is the largest source of revenue, agriculture is troubled by many issues like limited and divided farmland/cultivation lands, manures, chemical fertilizer, pesticides, and seeds etc. Adding on, even the water resources fall short, which makes agriculture even more difficult and challenging. But with the increase in the rate of consumers as well as increase in their health consciousness, leads to the demand for quality and quantity of chemical-free agricultural products. Hence technology can come into the picture to resolve these issues. This article proposes a solution to solve the above-mentioned difficulties by using hydroponics along with IoT where hydroponics is a way of cultivating agricultural products that end up saving more water as well as can grow the plants in small areas when compared with traditional methods of farming. It can be done in any unoccupied space in the house or anywhere, such as a room, lobby, patio, balcony, or any other unused space. So hydroponics results in higher yield of crops when controlled and efficiently monitored, growth of the plants can be monitored from anywhere in the world using IoT so it is time saving. The hydroponics with IoT model can also be modified into a vertical fashion. This model allows people to go organic and eat chemical /pesticide free food.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84957283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey 解决智能应用中安全问题的轻量级加密方法:综述
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053412
R. M, P. R.
With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.
随着物联网(IoT)的起源,大量实时应用正在发展,但在这个网络世界中,保护这些设备或用户的数据将更加受到关注。智能服务是物联网应用的基础组成部分,如智能系统、智能家居、智能城市、智能汽车等。在资源受限的环境中,通过抵抗网络攻击和采用有效的加密方法来保护物联网生态系统中通过网络生成和传输的大量数据是一个迫在眉睫的挑战。本文重点介绍了对用户/设备身份进行的详尽工作,以及通过ECC(椭圆曲线加密)为物联网生态系统提供的轻量级加密可行解决方案。本研究使用ECC的各种安全策略,确保实时物联网应用中数据的安全传输和设备/用户的认证。对以前的工作进行了系统的调查,以确定为物联网生态系统设计基于ecc的认证和安全传输解决方案的关键方面。本研究的结果是ECC的基本组成部分,要求和ECC的解决方案架构,用于物联网生态系统的各个安全方面,以确保用户/设备隐私和安全的数据传输,并解决其挑战。
{"title":"Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey","authors":"R. M, P. R.","doi":"10.1109/IDCIoT56793.2023.10053412","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053412","url":null,"abstract":"With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85517629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Data Sharing Framework with Blockchain in IoMT using Bald Eagle Search Optimization 使用秃鹰搜索优化的IoMT区块链安全数据共享框架
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053538
Mecline Jose F L, S. StewartKirubakaran, G. Paulraj, I. Jebadurai, Jebaveerasingh Jebadurai
In health information systems, present interoperability problems are solved by blockchain technology (BT). Moreover, blockchain technology offers the high-tech standard that assures a secure sharing of computerized healthcare information among healthcare providers, medical care organizations, individuals, and medical experts. In healthcare management, Internet of medical things (IoMT) devices can share sensory information from patients to be investigated and prepared. However, in IoMT devices the secrecy of patients’ health information transmission is still a major problem within a range of material regions. In order to overcome such challenges, an effective BES_SecDataSharing method is proposed for securely sharing the data with blockchain in IoMT. The entities involved in the proposed BES_SecDataSharing method are data owner, data user, cloud user, attribute authority, and blockchain. Six stages are involved in this proposed method are initialization phase, registration phase, key issuance phase, data preservation phase, authentication phase, and data sharing phase. The proposed BES_SecDataSharing methods has attained a minimum memory usage of 85 MB, validation time of 28.767 Sec, and normalized variance of 1.594. In addition, the method has obtained a maximum conditional privacy of 0.787.
在卫生信息系统中,目前的互操作性问题由区块链技术(BT)解决。此外,区块链技术提供了高科技标准,确保医疗保健提供者、医疗保健组织、个人和医疗专家之间安全共享计算机化的医疗保健信息。在医疗保健管理中,医疗物联网(IoMT)设备可以共享来自待调查和准备的患者的感官信息。然而,在IoMT设备中,患者健康信息传输的保密性在一系列物质区域内仍然是一个主要问题。为了克服这些挑战,提出了一种有效的BES_SecDataSharing方法,用于IoMT中与区块链的数据安全共享。提议的BES_SecDataSharing方法中涉及的实体是数据所有者、数据用户、云用户、属性权限和区块链。该方法包括初始化阶段、注册阶段、密钥发布阶段、数据保存阶段、身份验证阶段和数据共享阶段六个阶段。所提出的BES_SecDataSharing方法的最小内存使用量为85 MB,验证时间为28.767秒,归一化方差为1.594。此外,该方法获得了0.787的最大条件隐私。
{"title":"A Secure Data Sharing Framework with Blockchain in IoMT using Bald Eagle Search Optimization","authors":"Mecline Jose F L, S. StewartKirubakaran, G. Paulraj, I. Jebadurai, Jebaveerasingh Jebadurai","doi":"10.1109/IDCIoT56793.2023.10053538","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053538","url":null,"abstract":"In health information systems, present interoperability problems are solved by blockchain technology (BT). Moreover, blockchain technology offers the high-tech standard that assures a secure sharing of computerized healthcare information among healthcare providers, medical care organizations, individuals, and medical experts. In healthcare management, Internet of medical things (IoMT) devices can share sensory information from patients to be investigated and prepared. However, in IoMT devices the secrecy of patients’ health information transmission is still a major problem within a range of material regions. In order to overcome such challenges, an effective BES_SecDataSharing method is proposed for securely sharing the data with blockchain in IoMT. The entities involved in the proposed BES_SecDataSharing method are data owner, data user, cloud user, attribute authority, and blockchain. Six stages are involved in this proposed method are initialization phase, registration phase, key issuance phase, data preservation phase, authentication phase, and data sharing phase. The proposed BES_SecDataSharing methods has attained a minimum memory usage of 85 MB, validation time of 28.767 Sec, and normalized variance of 1.594. In addition, the method has obtained a maximum conditional privacy of 0.787.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82104008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Generation Algorithm for Multi-scene Virtual Images of Dynamic Pictures Based on Metaverse 基于Metaverse的动态图片多场景虚拟图像智能生成算法
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053548
Yu Shengwen, Kan Xi
Beginning from the Facebook changed its name to Meta, the metaverse is then focused by the researchers. This research study follows the trend of intelligent generation algorithm for the multi-scene virtual images of dynamic images based on metaverse. Conditional generative adversarial networks add additional conditional information to the generator and discriminator, extending the structure of standard GANs. Hence, the GAN is considered as the integration algorithm. Through digital twin technology and Internet of Things technology, the expansion of the living environment is realized, and the real world and the virtual world are integrated to construct a comprehensive environment. Hence, the model is applied to the intelligent generation algorithm. The effectiveness has been evaluated through simulation.
从Facebook更名为Meta开始,元宇宙就成为了研究人员关注的焦点。本研究顺应了基于meta - verse的动态图像多场景虚拟图像智能生成算法的发展趋势。条件生成对抗网络在生成器和鉴别器上增加了额外的条件信息,扩展了标准gan的结构。因此,GAN被认为是一种积分算法。通过数字孪生技术和物联网技术,实现生活环境的扩展,将现实世界和虚拟世界融合在一起,构建一个全面的环境。因此,将该模型应用于智能生成算法中。通过仿真验证了该方法的有效性。
{"title":"Intelligent Generation Algorithm for Multi-scene Virtual Images of Dynamic Pictures Based on Metaverse","authors":"Yu Shengwen, Kan Xi","doi":"10.1109/IDCIoT56793.2023.10053548","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053548","url":null,"abstract":"Beginning from the Facebook changed its name to Meta, the metaverse is then focused by the researchers. This research study follows the trend of intelligent generation algorithm for the multi-scene virtual images of dynamic images based on metaverse. Conditional generative adversarial networks add additional conditional information to the generator and discriminator, extending the structure of standard GANs. Hence, the GAN is considered as the integration algorithm. Through digital twin technology and Internet of Things technology, the expansion of the living environment is realized, and the real world and the virtual world are integrated to construct a comprehensive environment. Hence, the model is applied to the intelligent generation algorithm. The effectiveness has been evaluated through simulation.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84652749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IDCIoT 2023 Cover Page IDCIoT 2023封面页
Pub Date : 2023-01-05 DOI: 10.1109/idciot56793.2023.10053495
{"title":"IDCIoT 2023 Cover Page","authors":"","doi":"10.1109/idciot56793.2023.10053495","DOIUrl":"https://doi.org/10.1109/idciot56793.2023.10053495","url":null,"abstract":"","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84653296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Solution for Police Functions 警察职能的机器学习解决方案
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053461
A. P, Senthil Kumar A M, C. Vignesh, K. S
In our society, crime has become one of the most prevalent problems. Preventing it is of paramount importance. In order to prevent it, crimes must be tracked and a public database must be maintained so that case histories can be retrieved when necessary in the future. This project is being proposed to reduce criminal activities by developing predictive models. From past experiments, many people have used deep learning methods to identify patterns of only one particular crime from past criminal activities that took place in different countries. In this research work, machine learning is being applied to predict the states which have high crime rates by analyzing the past crime data. Consequently, the police can focus on those areas where crimes are likely to occur. To predict this, machine learning algorithms like Decision trees and Random Forest algorithms were being used to classify and give accurate information.
在我们的社会中,犯罪已成为最普遍的问题之一。预防它是至关重要的。为了防止犯罪,必须对犯罪进行跟踪,并建立一个公共数据库,以便将来必要时能够检索到案件历史。提出这个项目是为了通过开发预测模型来减少犯罪活动。从过去的实验中,许多人使用深度学习方法从过去发生在不同国家的犯罪活动中识别出一种特定犯罪的模式。在这项研究工作中,机器学习被应用于通过分析过去的犯罪数据来预测犯罪率高的州。因此,警察可以集中在那些可能发生犯罪的地区。为了预测这一点,机器学习算法,如决策树和随机森林算法被用来分类和提供准确的信息。
{"title":"Machine Learning Solution for Police Functions","authors":"A. P, Senthil Kumar A M, C. Vignesh, K. S","doi":"10.1109/IDCIoT56793.2023.10053461","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053461","url":null,"abstract":"In our society, crime has become one of the most prevalent problems. Preventing it is of paramount importance. In order to prevent it, crimes must be tracked and a public database must be maintained so that case histories can be retrieved when necessary in the future. This project is being proposed to reduce criminal activities by developing predictive models. From past experiments, many people have used deep learning methods to identify patterns of only one particular crime from past criminal activities that took place in different countries. In this research work, machine learning is being applied to predict the states which have high crime rates by analyzing the past crime data. Consequently, the police can focus on those areas where crimes are likely to occur. To predict this, machine learning algorithms like Decision trees and Random Forest algorithms were being used to classify and give accurate information.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80261912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Music Genre Classification Method with Feature Extraction based on Deep Learning Techniques 基于深度学习技术的特征提取智能音乐类型分类方法
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053460
K. Manikandan, G. Mathivanan
The music genre is a standard category that identifies some piece of music that belongs to a shared set of conventions. The physical musical albums are further replaced by digital music due to the varied interest. In order to enhance the efficiency and accuracy in digital music genre, deep learning technique is used. Deep learning is a type of machine learning and artificial intelligence which makes the process faster and earlier through training and learning process. This is an unsupervised learning technique that uses the way of automatic predictive analysis. It enhances to learn high level features from data in a sequential manner.
音乐类型是一个标准的类别,用于识别属于一组共享约定的音乐片段。由于兴趣的多样化,数字音乐进一步取代了实体音乐专辑。为了提高数字音乐体裁识别的效率和准确性,采用了深度学习技术。深度学习是一种机器学习和人工智能,它通过训练和学习过程使过程更快、更早。这是一种使用自动预测分析方法的无监督学习技术。它增强了以顺序方式从数据中学习高级特征的能力。
{"title":"An Intelligent Music Genre Classification Method with Feature Extraction based on Deep Learning Techniques","authors":"K. Manikandan, G. Mathivanan","doi":"10.1109/IDCIoT56793.2023.10053460","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053460","url":null,"abstract":"The music genre is a standard category that identifies some piece of music that belongs to a shared set of conventions. The physical musical albums are further replaced by digital music due to the varied interest. In order to enhance the efficiency and accuracy in digital music genre, deep learning technique is used. Deep learning is a type of machine learning and artificial intelligence which makes the process faster and earlier through training and learning process. This is an unsupervised learning technique that uses the way of automatic predictive analysis. It enhances to learn high level features from data in a sequential manner.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80711095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handy Non-Invasive Blood Glucose Estimator using Arduino and NodeMCU 使用Arduino和NodeMCU的便携式无创血糖仪
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053485
S. G, S. S, S. S, Sai Dinesh P, Shashank Reddy P, Venkata Prasad M
People in almost every nation on the earth suffer with diabetes, a widespread chronic disease. Inspecting blood sugar values is imperative for augmenting the longevity of human life. Invasive testing is quite sore and nerve damaging. In this paper, the light obtained from the photo detector is utilized to assess the variance in glucose intensity, which is then employed for measuring the blood glucose content. The detected glucose value is shown on a Liquid Crystal Display (LCD) and also sent to a cloud server using the Node Microcontroller Unit (Node MCU) of the non-invasive embedded system implementation. The estimated glucose value is also sent to the mobile phone and coupled with ThingSpeak for portraying the analytics.
世界上几乎每个国家的人都患有糖尿病,这是一种普遍存在的慢性疾病。检查血糖值对于延长人的寿命是必不可少的。侵入性检查是相当疼痛和神经损伤。在本文中,利用光检测器获得的光来评估葡萄糖强度的方差,然后将其用于测量血糖含量。检测到的葡萄糖值显示在液晶显示器(LCD)上,并通过非侵入式嵌入式系统实现的节点微控制器(Node MCU)发送到云服务器。估计的葡萄糖值也会被发送到手机,并与ThingSpeak相结合,以描述分析结果。
{"title":"Handy Non-Invasive Blood Glucose Estimator using Arduino and NodeMCU","authors":"S. G, S. S, S. S, Sai Dinesh P, Shashank Reddy P, Venkata Prasad M","doi":"10.1109/IDCIoT56793.2023.10053485","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053485","url":null,"abstract":"People in almost every nation on the earth suffer with diabetes, a widespread chronic disease. Inspecting blood sugar values is imperative for augmenting the longevity of human life. Invasive testing is quite sore and nerve damaging. In this paper, the light obtained from the photo detector is utilized to assess the variance in glucose intensity, which is then employed for measuring the blood glucose content. The detected glucose value is shown on a Liquid Crystal Display (LCD) and also sent to a cloud server using the Node Microcontroller Unit (Node MCU) of the non-invasive embedded system implementation. The estimated glucose value is also sent to the mobile phone and coupled with ThingSpeak for portraying the analytics.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75802291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
物联网技术
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1