首页 > 最新文献

物联网技术最新文献

英文 中文
Remote Intelligent System for Monitoring and Control of Water Distribution Network Using Remote I/O Module for Smart City 基于远程I/O模块的智慧城市供水网络远程智能监控系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053492
C. Raj, W. R. Babu, V. Gomathi, S. Bharath, G. Jagatap, S. S. Kumar
The need for drinking water is very essential in today's world. The government has been adopting a variety of measures to save drinking water and spend it economically. It is everyone's duty to save water and use it sparingly. Water is wasted due to breakage of the water pipe, excessive use of water, measurement in a faulty instrument and so on. The leakage of water from the pipeline and the usage of water is intelligently detected and measured by PLC – Remote I/O Module based system. Each house or utility is installed with intelligent flow meters and the inputs or readings are collected from the individual meters by water distribution board via the iOT. Faults and other abnormal conditions are identified instantaneously, and the health of the distribution system is monitored by SCADA.
在当今世界,对饮用水的需求是非常重要的。政府一直在采取各种措施来节约饮用水,节约用水。节约用水和节约用水是每个人的责任。由于水管断裂、用水过多、在有故障的仪器中测量等原因造成水的浪费。通过基于PLC -远程I/O模块的系统,对管道的漏水和用水情况进行智能检测和测量。每栋房屋或公用设施都安装了智能流量计,配水板通过物联网从各个仪表收集输入或读数。通过SCADA实时识别配电系统的故障和异常情况,监测配电系统的健康状况。
{"title":"Remote Intelligent System for Monitoring and Control of Water Distribution Network Using Remote I/O Module for Smart City","authors":"C. Raj, W. R. Babu, V. Gomathi, S. Bharath, G. Jagatap, S. S. Kumar","doi":"10.1109/IDCIoT56793.2023.10053492","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053492","url":null,"abstract":"The need for drinking water is very essential in today's world. The government has been adopting a variety of measures to save drinking water and spend it economically. It is everyone's duty to save water and use it sparingly. Water is wasted due to breakage of the water pipe, excessive use of water, measurement in a faulty instrument and so on. The leakage of water from the pipeline and the usage of water is intelligently detected and measured by PLC – Remote I/O Module based system. Each house or utility is installed with intelligent flow meters and the inputs or readings are collected from the individual meters by water distribution board via the iOT. Faults and other abnormal conditions are identified instantaneously, and the health of the distribution system is monitored by SCADA.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"55 1","pages":"336-339"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82251301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Deep Learning to Spot Communities for Influence Maximization in Social Networks 利用深度学习在社交网络中发现社区以实现影响力最大化
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053447
S. Mishra, Rajendra Kumar Dwivedi
Groups play a crucial role in affecting decisions of individuals who are part of the group. When it comes to social networks the group here may be small with some 10-15 members or very big contacting more than 100 members. Thus, there is high possibility of individuals belonging to one or more groups in social networks. It thus becomes important to activate influential members of a group to ensure maximum information propagation. This work proposes a community-based seed selection algorithm. The communities are first identified node embedding which performs graph clustering. After which proportionate distribution of seed nodes is carried out to ensure fair selection. Mapping node features to lower dimensional space and similar nodes getting placed closer to each other proves a better technique for community detection and is also expandable if new nodes get introduced in the network.
群体在影响作为群体一部分的个人的决策方面起着至关重要的作用。当涉及到社交网络时,这里的小组可能很小,只有10-15个成员,也可能很大,有100多个成员。因此,个人在社交网络中属于一个或多个群体的可能性很高。因此,激活一个群体中有影响力的成员以确保信息的最大传播就变得非常重要。本文提出了一种基于社区的种子选择算法。首先通过节点嵌入识别社区,然后进行图聚类。然后按比例分配种子节点,确保公平选择。将节点特征映射到低维空间,并将相似的节点放置在彼此更近的位置,证明了一种更好的社区检测技术,并且在网络中引入新节点时也可以扩展。
{"title":"Leveraging Deep Learning to Spot Communities for Influence Maximization in Social Networks","authors":"S. Mishra, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053447","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053447","url":null,"abstract":"Groups play a crucial role in affecting decisions of individuals who are part of the group. When it comes to social networks the group here may be small with some 10-15 members or very big contacting more than 100 members. Thus, there is high possibility of individuals belonging to one or more groups in social networks. It thus becomes important to activate influential members of a group to ensure maximum information propagation. This work proposes a community-based seed selection algorithm. The communities are first identified node embedding which performs graph clustering. After which proportionate distribution of seed nodes is carried out to ensure fair selection. Mapping node features to lower dimensional space and similar nodes getting placed closer to each other proves a better technique for community detection and is also expandable if new nodes get introduced in the network.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"21 1","pages":"377-382"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81876423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation on Battery Management System for Autonomous Electric Vehicles 自动驾驶电动汽车电池管理系统研究
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053441
K. Thilak, S. Ashwinkarthik, M. Varatharaj, V. Muralidharan, M. Vinosh, Yayati Shinde
Autonomous Electric Vehicles (AEVs) use the next generation batteries and other upgraded technologies to transform passengers from a boarding point to their destination more efficiently, without the need for drivers and fossil fuel-driven internal combustion engines. In today's electric vehicles, the commonly used batteries are lithium-ion batteries. This paper presents the study of Battery Monitoring Systems (BMS) in AEVs. The aim of the monitoring system in a battery is to improve the efficiency of electric vehicles. Therefore, Very Large-Scale Integration (VLSI) plays a role in AEVs due to the growth in efficiency of the BMS. To overcome the issues in BMS, some modules are also developed in the battery monitoring system to improve the state of technology.
自动驾驶电动汽车(aev)使用下一代电池和其他升级技术,在不需要司机和化石燃料驱动的内燃机的情况下,更有效地将乘客从上车点转移到目的地。在今天的电动汽车中,常用的电池是锂离子电池。本文介绍了电动汽车电池监测系统(BMS)的研究。电池监控系统的目的是提高电动汽车的效率。因此,由于BMS效率的提高,超大规模集成电路(VLSI)在aev中发挥了作用。为了克服BMS存在的问题,在电池监测系统中也开发了一些模块,以提高技术水平。
{"title":"An Investigation on Battery Management System for Autonomous Electric Vehicles","authors":"K. Thilak, S. Ashwinkarthik, M. Varatharaj, V. Muralidharan, M. Vinosh, Yayati Shinde","doi":"10.1109/IDCIoT56793.2023.10053441","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053441","url":null,"abstract":"Autonomous Electric Vehicles (AEVs) use the next generation batteries and other upgraded technologies to transform passengers from a boarding point to their destination more efficiently, without the need for drivers and fossil fuel-driven internal combustion engines. In today's electric vehicles, the commonly used batteries are lithium-ion batteries. This paper presents the study of Battery Monitoring Systems (BMS) in AEVs. The aim of the monitoring system in a battery is to improve the efficiency of electric vehicles. Therefore, Very Large-Scale Integration (VLSI) plays a role in AEVs due to the growth in efficiency of the BMS. To overcome the issues in BMS, some modules are also developed in the battery monitoring system to improve the state of technology.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"1 1","pages":"714-718"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83566554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AI-Powered Mobility Educational Application for Enhancing Student Learning 促进学生学习的人工智能移动教育应用
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053423
Manicka Raja M, Mokesh Anand Kumar G, Sanchita T, S. A
Artificial Intelligence is growing to be the future of today’s world. It builds a path for communicable applications and an easier understanding for the system and the user. By adopting the advantages of artificial intelligence, our project focuses on estimating and delivering the right resources for a college student. The web app, Edu. Social is created to determine and seek deep skills of a student and provide them with the right resources to heighten their knowledge. The web app would analyze the right resources based on the initial and prime inputs given by the students. The resources comprise placement opportunities, certification suggestions, workshops, seminars, activities and many more that are happening around the respective student. The web app does not just focus on the academic perspective but also the inner passion of a student. Therefore, this platform would be a great benefit for a student to gain experience and to see the viable resources put forth according to their field of interest and choice. The main focus of this Web Application is to keep students up to date by notifying them about new technologies available and where to focus on by providing frequent assessments to know where they stand.
人工智能正在成为当今世界的未来。它为可传递的应用程序构建了一条路径,并使系统和用户更容易理解。通过采用人工智能的优势,我们的项目专注于为大学生评估和提供合适的资源。网络应用,Edu。社会是为了确定和寻找学生的深度技能,并为他们提供适当的资源来提高他们的知识。网络应用程序将根据学生提供的初始和主要输入分析正确的资源。这些资源包括就业机会、认证建议、研讨会、研讨会、活动以及更多发生在各自学生周围的事情。这款网络应用不仅关注学术视角,还关注学生的内心激情。因此,这个平台对学生来说是一个很大的好处,可以让他们获得经验,并根据他们的兴趣和选择看到可行的资源。这个Web应用程序的主要焦点是通过通知学生可用的新技术和通过提供频繁的评估来了解他们所处的位置,从而使他们保持最新状态。
{"title":"AI-Powered Mobility Educational Application for Enhancing Student Learning","authors":"Manicka Raja M, Mokesh Anand Kumar G, Sanchita T, S. A","doi":"10.1109/IDCIoT56793.2023.10053423","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053423","url":null,"abstract":"Artificial Intelligence is growing to be the future of today’s world. It builds a path for communicable applications and an easier understanding for the system and the user. By adopting the advantages of artificial intelligence, our project focuses on estimating and delivering the right resources for a college student. The web app, Edu. Social is created to determine and seek deep skills of a student and provide them with the right resources to heighten their knowledge. The web app would analyze the right resources based on the initial and prime inputs given by the students. The resources comprise placement opportunities, certification suggestions, workshops, seminars, activities and many more that are happening around the respective student. The web app does not just focus on the academic perspective but also the inner passion of a student. Therefore, this platform would be a great benefit for a student to gain experience and to see the viable resources put forth according to their field of interest and choice. The main focus of this Web Application is to keep students up to date by notifying them about new technologies available and where to focus on by providing frequent assessments to know where they stand.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"82 1","pages":"925-930"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87114562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Virtual Reality (VR) based Intelligent Guiding System 一种基于虚拟现实(VR)的智能导航系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053542
Chen Fuxiong
A novel VR intelligent guiding system with image processing and programming methods is designed in this study. The fundamental goal of VR technology is to achieve realistic experiences and also natural technology-based human-computer interaction. human-computer interaction based on the natural technologies, so a system that achieves or partially achieves such a goal can be referred to as virtual reality systems. In the designed system, the novel contains the image processing and programming methods. (1) The novel image virtualization method is designed to provide the novel idea of the image pre-processing. (2) The suitable programming framework is designed to make the system efficient. Through the experiment on the UI and the systematic implementation, the performance is tested.
本文设计了一种基于图像处理和编程方法的虚拟现实智能导航系统。虚拟现实技术的根本目标是实现真实的体验和基于自然技术的人机交互。基于自然技术的人机交互,因此实现或部分实现这一目标的系统可以称为虚拟现实系统。在设计的系统中,新颖地包含了图像处理和编程方法。(1)设计了新的图像虚拟化方法,为图像预处理提供了新的思路。(2)设计了合适的编程框架,使系统高效。通过用户界面实验和系统实现,对系统性能进行了测试。
{"title":"A Novel Virtual Reality (VR) based Intelligent Guiding System","authors":"Chen Fuxiong","doi":"10.1109/IDCIoT56793.2023.10053542","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053542","url":null,"abstract":"A novel VR intelligent guiding system with image processing and programming methods is designed in this study. The fundamental goal of VR technology is to achieve realistic experiences and also natural technology-based human-computer interaction. human-computer interaction based on the natural technologies, so a system that achieves or partially achieves such a goal can be referred to as virtual reality systems. In the designed system, the novel contains the image processing and programming methods. (1) The novel image virtualization method is designed to provide the novel idea of the image pre-processing. (2) The suitable programming framework is designed to make the system efficient. Through the experiment on the UI and the systematic implementation, the performance is tested.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"4 1","pages":"294-297"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82619176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious URL Detection and Classification Analysis using Machine Learning Models 使用机器学习模型的恶意URL检测和分类分析
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053422
Upendra Shetty D R, Anusha Patil, Mohana Mohana
One of most frequent cybersecurity vulnerabilities is malicious websites or malicious uniform resource location (URL). Each year, people are losing billions of rupees by hosting gratuitous material (spam, malware, unsuitable adverts, spoofing etc.) and tempting naïve visitors to fall for scams. Email, adverts, web searches, or connections from other websites can all encourage people to visit these websites. Users click on the malicious URL in each instance, a trustworthy system that can categorize and identify dangerous URLs is needed due to rise in phishing, spamming, and malware occurrences. Due to the enormous amount of data, changing patterns and technologies, as well as the complex relationships between characteristics, non-availability of training data, non-linearity and the presence of outliers made classification challenging. In the proposed work, malicious URLs are detected for various applications. Dataset has been categorized into four types i.e., Phishing, Benign, Defacement and Malware. Totally 6,51,191 URLs have been used for proposed implementation. Three machine learning algorithms such as random forest, LightGBM and XGBoost were implemented to detect and classify malicious URLs.
最常见的网络安全漏洞之一是恶意网站或恶意统一资源位置(URL)。每年,人们都因托管无端内容(垃圾邮件、恶意软件、不合适的广告、欺骗等)和引诱naïve访问者上当受骗而损失数十亿卢比。电子邮件、广告、网络搜索或来自其他网站的连接都可以鼓励人们访问这些网站。用户在每个实例中单击恶意URL,由于网络钓鱼、垃圾邮件和恶意软件事件的增加,需要一个可以对危险URL进行分类和识别的可靠系统。由于数据量巨大,不断变化的模式和技术,以及特征之间的复杂关系,训练数据的不可用性,非线性和异常值的存在使得分类具有挑战性。在建议的工作中,检测各种应用程序的恶意url。数据集被分为四种类型,即网络钓鱼,良性,污损和恶意软件。总共有651,191个url被用于拟议的实施。采用随机森林、LightGBM和XGBoost三种机器学习算法对恶意url进行检测和分类。
{"title":"Malicious URL Detection and Classification Analysis using Machine Learning Models","authors":"Upendra Shetty D R, Anusha Patil, Mohana Mohana","doi":"10.1109/IDCIoT56793.2023.10053422","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053422","url":null,"abstract":"One of most frequent cybersecurity vulnerabilities is malicious websites or malicious uniform resource location (URL). Each year, people are losing billions of rupees by hosting gratuitous material (spam, malware, unsuitable adverts, spoofing etc.) and tempting naïve visitors to fall for scams. Email, adverts, web searches, or connections from other websites can all encourage people to visit these websites. Users click on the malicious URL in each instance, a trustworthy system that can categorize and identify dangerous URLs is needed due to rise in phishing, spamming, and malware occurrences. Due to the enormous amount of data, changing patterns and technologies, as well as the complex relationships between characteristics, non-availability of training data, non-linearity and the presence of outliers made classification challenging. In the proposed work, malicious URLs are detected for various applications. Dataset has been categorized into four types i.e., Phishing, Benign, Defacement and Malware. Totally 6,51,191 URLs have been used for proposed implementation. Three machine learning algorithms such as random forest, LightGBM and XGBoost were implemented to detect and classify malicious URLs.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"15 1","pages":"470-476"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72994949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Crevices Recognition on Asphalt Surfaces using Convolutional Neural Network 基于卷积神经网络的沥青路面裂缝识别
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053463
Mukesh Chinta, Anagani Likhita, Yamini Aravapalli
Heavy rainfalls leading to floods in cities and villages is a common sight in our country. These situations lead to destruction of roadways and bridges, and often public infrastructure as an aftermath. Inspection of such facilities to assess the damage and identify any potential vulnerability is a tedious process. Some of the cracks/crevices might not be even visible to the naked eye. An automated system which can detect cracks saves money, time and even lives. This will help us improve road safety which is the reason for major accidents. The proposed work uses machine learning concepts to implement such a system which automatically detects the cracks on the roads, bridges and will send an alert to the concerned authorities there by potentially reducing the risk for disaster occurrence. Convolutional Neural Networks (CNN) can be used for the identification of cracks. By integrating the CNN Classifier with the camera, the cracks can be automatically detected in that region and reported.
大雨导致城市和村庄洪水在我国是一个常见的景象。这些情况导致道路和桥梁遭到破坏,后果往往是公共基础设施遭到破坏。对这些设施进行检查以评估损害并确定任何潜在的脆弱性是一个繁琐的过程。有些裂缝甚至肉眼都看不见。一个可以检测裂缝的自动化系统节省了金钱、时间甚至生命。这将有助于我们改善道路安全,这是造成重大事故的原因。拟议的工作使用机器学习概念来实现这样一个系统,该系统可以自动检测道路和桥梁上的裂缝,并通过潜在地降低灾难发生的风险向有关当局发送警报。卷积神经网络(CNN)可以用于裂缝的识别。通过将CNN分类器与摄像机相结合,可以在该区域自动检测并报告裂缝。
{"title":"Crevices Recognition on Asphalt Surfaces using Convolutional Neural Network","authors":"Mukesh Chinta, Anagani Likhita, Yamini Aravapalli","doi":"10.1109/IDCIoT56793.2023.10053463","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053463","url":null,"abstract":"Heavy rainfalls leading to floods in cities and villages is a common sight in our country. These situations lead to destruction of roadways and bridges, and often public infrastructure as an aftermath. Inspection of such facilities to assess the damage and identify any potential vulnerability is a tedious process. Some of the cracks/crevices might not be even visible to the naked eye. An automated system which can detect cracks saves money, time and even lives. This will help us improve road safety which is the reason for major accidents. The proposed work uses machine learning concepts to implement such a system which automatically detects the cracks on the roads, bridges and will send an alert to the concerned authorities there by potentially reducing the risk for disaster occurrence. Convolutional Neural Networks (CNN) can be used for the identification of cracks. By integrating the CNN Classifier with the camera, the cracks can be automatically detected in that region and reported.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"22 1","pages":"504-509"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79613284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Classifiers in a Plant Recommendation System based on Environmental Factors 基于环境因素的植物推荐系统中分类器的比较分析
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053489
Rohan Mittal, Sreenitya Mandava, Tanmay S. Shetty, Harshita Patel
With the growing demand for reforestation and a sustainable neighborhood, everyone has begun to grow their own plants. However, the survival of a plant depends on many factors. A common problem faced by general customers is that their purchased plants, in gardens or balconies, fail to live long. This might happen because of many reasons, but the most recurrent one is the plant not adapting to the environmental conditions. Thus, personalizing the plant preferences is essential for users, so that they can buy the plants with high confidence of them surviving long. Here, this research work intends to develop an application with various filtering options, to determine the environmental conditions of the location, and the quality of lifestyle the plants can be provided with. To do so, we performed a comparison of the popular classification algorithms and found that the Random Forest Classifier served our purpose, successfully training an AI Model for predicting plants suiting the given conditions.
随着对重新造林和可持续社区的需求不断增长,每个人都开始自己种植植物。然而,植物的生存取决于许多因素。普通消费者面临的一个普遍问题是,他们在花园或阳台上购买的植物不能长时间生存。这种情况的发生可能有很多原因,但最常见的是植物不适应环境条件。因此,个性化的植物偏好对用户来说是必不可少的,这样他们就可以放心地购买这些植物。在这里,本研究工作打算开发一个具有各种过滤选项的应用程序,以确定位置的环境条件,以及植物可以提供的生活质量。为此,我们对流行的分类算法进行了比较,发现随机森林分类器达到了我们的目的,成功地训练了一个人工智能模型来预测适合给定条件的植物。
{"title":"Comparative Analysis of Classifiers in a Plant Recommendation System based on Environmental Factors","authors":"Rohan Mittal, Sreenitya Mandava, Tanmay S. Shetty, Harshita Patel","doi":"10.1109/IDCIoT56793.2023.10053489","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053489","url":null,"abstract":"With the growing demand for reforestation and a sustainable neighborhood, everyone has begun to grow their own plants. However, the survival of a plant depends on many factors. A common problem faced by general customers is that their purchased plants, in gardens or balconies, fail to live long. This might happen because of many reasons, but the most recurrent one is the plant not adapting to the environmental conditions. Thus, personalizing the plant preferences is essential for users, so that they can buy the plants with high confidence of them surviving long. Here, this research work intends to develop an application with various filtering options, to determine the environmental conditions of the location, and the quality of lifestyle the plants can be provided with. To do so, we performed a comparison of the popular classification algorithms and found that the Random Forest Classifier served our purpose, successfully training an AI Model for predicting plants suiting the given conditions.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"1 1","pages":"689-694"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79577906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Home Security Monitoring System based on Face Recognition and Android Application 基于人脸识别和Android应用的智能家居安防监控系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053558
S. Bhatlawande, S. Shilaskar, Tejal Gadad, S. Ghulaxe, Rachana Gaikwad
Facial recognition is important concept when it comes to identification and security. The traditional ways of securing homes like the use of locks and keys are inefficient. Developing a security system using artificial intelligence (AI) that will monitor the surroundings and act in case of emergencies is vital. This paper proposes a smart home security monitoring system that can make decisions based on facial recognition technology. It is implemented using Mediapipe for face detection and FaceNet model for facial feature extraction. The proposed face recognition model is 80.55% accurate. An android application is developed which allows user to interact with the system even from remote distances. A door opening mechanism is implemented with the help of ESP8266. With the aid of the feedback from the reed switch, an alarm sounds when someone tries to break into the residence. The developed system provides a whole new security approach by discarding the need for traditional methods of security. The accuracy of the system is 80.55%.
面部识别在身份识别和安全方面是一个重要的概念。使用锁和钥匙等传统的房屋安全方式效率低下。开发利用人工智能(AI)监控周围环境并在紧急情况下采取行动的安全系统至关重要。本文提出了一种基于人脸识别技术的智能家居安防监控系统。使用Mediapipe进行人脸检测,使用FaceNet模型进行人脸特征提取。所提出的人脸识别模型准确率为80.55%。开发了一个android应用程序,允许用户在远程与系统交互。利用ESP8266实现了一种开门机构。借助簧片开关的反馈,当有人试图闯入住宅时,警报就会响起。该系统摒弃了传统的安全方法,提供了一种全新的安全方法。该系统的准确率为80.55%。
{"title":"Smart Home Security Monitoring System based on Face Recognition and Android Application","authors":"S. Bhatlawande, S. Shilaskar, Tejal Gadad, S. Ghulaxe, Rachana Gaikwad","doi":"10.1109/IDCIoT56793.2023.10053558","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053558","url":null,"abstract":"Facial recognition is important concept when it comes to identification and security. The traditional ways of securing homes like the use of locks and keys are inefficient. Developing a security system using artificial intelligence (AI) that will monitor the surroundings and act in case of emergencies is vital. This paper proposes a smart home security monitoring system that can make decisions based on facial recognition technology. It is implemented using Mediapipe for face detection and FaceNet model for facial feature extraction. The proposed face recognition model is 80.55% accurate. An android application is developed which allows user to interact with the system even from remote distances. A door opening mechanism is implemented with the help of ESP8266. With the aid of the feedback from the reed switch, an alarm sounds when someone tries to break into the residence. The developed system provides a whole new security approach by discarding the need for traditional methods of security. The accuracy of the system is 80.55%.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"54 1","pages":"222-227"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79639618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Machine Learning-Based Approach for Anomaly Detection for Secure Cloud Computing Environments 基于机器学习的安全云计算环境异常检测方法
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053518
Priya Parameswarappa, Taral Shah, Govinda rajulu Lanke
The concept of "cloud computing" has been presented as a promising strategy for providing online service hosting and distribution. Despite the widespread adoption of cloud computing, security remains a top priority. Several secure methods have been devised to safeguard communication in such scenarios, with the majority of these solutions based on attack signatures. Unfortunately, these technologies cannot always detect every possible danger. A machine learning method was recently outlined. The judgment could be inaccurate if the training set is missing examples from a certain category. In this research, an innovative firewall strategy for safe cloud-based computing is presented using machine learning system. The proposed methods estimate the final assault category categorization by combining the judgments of the nodes from the past with the decision of the machine learning algorithm in the present, a technique termed most frequent decision. Both learning efficiency and system precision are improved by this method. Our results are based on UNSW-NB-15, a publicly available dataset. According to the evidence provided by our data, it improves anomaly detection by 97.68 percent. A Machine Learning-Based Approach for Anomaly Detection for Secure Cloud Computing Environments
“云计算”的概念被认为是提供在线服务托管和分发的一种很有前途的策略。尽管云计算被广泛采用,但安全性仍然是重中之重。已经设计了几种安全方法来保护这种情况下的通信,其中大多数解决方案基于攻击签名。不幸的是,这些技术并不能总是检测到所有可能的危险。最近提出了一种机器学习方法。如果训练集缺少某个类别的样本,则判断可能是不准确的。在本研究中,提出了一种基于机器学习系统的安全云计算防火墙策略。提出的方法通过将过去节点的判断与当前机器学习算法的决策相结合来估计最终的攻击类别分类,这种技术称为最频繁决策。该方法提高了学习效率和系统精度。我们的结果是基于UNSW-NB-15,一个公开的数据集。根据我们的数据提供的证据,它将异常检测提高了97.68%。基于机器学习的安全云计算环境异常检测方法
{"title":"A Machine Learning-Based Approach for Anomaly Detection for Secure Cloud Computing Environments","authors":"Priya Parameswarappa, Taral Shah, Govinda rajulu Lanke","doi":"10.1109/IDCIoT56793.2023.10053518","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053518","url":null,"abstract":"The concept of \"cloud computing\" has been presented as a promising strategy for providing online service hosting and distribution. Despite the widespread adoption of cloud computing, security remains a top priority. Several secure methods have been devised to safeguard communication in such scenarios, with the majority of these solutions based on attack signatures. Unfortunately, these technologies cannot always detect every possible danger. A machine learning method was recently outlined. The judgment could be inaccurate if the training set is missing examples from a certain category. In this research, an innovative firewall strategy for safe cloud-based computing is presented using machine learning system. The proposed methods estimate the final assault category categorization by combining the judgments of the nodes from the past with the decision of the machine learning algorithm in the present, a technique termed most frequent decision. Both learning efficiency and system precision are improved by this method. Our results are based on UNSW-NB-15, a publicly available dataset. According to the evidence provided by our data, it improves anomaly detection by 97.68 percent. A Machine Learning-Based Approach for Anomaly Detection for Secure Cloud Computing Environments","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"53 1","pages":"931-940"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75328320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
物联网技术
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1