首页 > 最新文献

物联网技术最新文献

英文 中文
Voting Classifier on Ensemble Algorithms for Breast Cancer Prediction 基于集成算法的投票分类器乳腺癌预测
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053498
Rajani Uppara, Surabhi Yadav, Dr.M. Kavitha
One of the leading causes of death in humans is cancer, with Breast cancer accounting for the majority of deaths among women. Both men and women are developing more Breast cancer cases every day. Breast cancer has become a huge health concerning issue. If Breast cancer is detected in early stages like stages 0 and 1, it can be cured without too much health risk which will reduce the death rate. Computer-Aided Detection or CAD systems are available to detect whether a woman or man has Breast cancer or not. The purpose of our research paper is to find a technique or algorithm that can help in the early detection of Breast cancer to save lives and reduce casualties. Here, different Machine Learning (ML) algorithms like decision tree, Support vector machine, ensemble algorithm of random forest with bagging and Ada boosting, and Voting Classifier are used. Breast cancer prediction with a Voting Classifier on ensemble algorithms is built. The performance of applied models is analyzed in terms of Accuracy, Precision, Recall, F1-score, and Support. The Voting Classifier gives the best results with 0.96 Accuracy because it uses the mean of ensemble algorithms to improve Accuracy value.
人类死亡的主要原因之一是癌症,妇女死亡的主要原因是乳腺癌。男性和女性每天都有更多的乳腺癌病例。乳腺癌已经成为一个巨大的健康问题。如果乳腺癌在早期阶段,如0期和1期被发现,它可以治愈,没有太多的健康风险,这将降低死亡率。计算机辅助检测或CAD系统可用于检测女性或男性是否患有乳腺癌。我们研究论文的目的是找到一种技术或算法,可以帮助早期发现乳腺癌,以挽救生命和减少伤亡。这里使用了不同的机器学习(ML)算法,如决策树,支持向量机,随机森林与bagging和Ada boosting的集成算法,以及投票分类器。建立了基于集成算法的投票分类器的乳腺癌预测方法。应用模型的性能从准确性、精密度、召回率、f1分数和支持度等方面进行了分析。投票分类器使用集成算法的平均值来提高准确率值,得到了0.96的最佳结果。
{"title":"Voting Classifier on Ensemble Algorithms for Breast Cancer Prediction","authors":"Rajani Uppara, Surabhi Yadav, Dr.M. Kavitha","doi":"10.1109/IDCIoT56793.2023.10053498","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053498","url":null,"abstract":"One of the leading causes of death in humans is cancer, with Breast cancer accounting for the majority of deaths among women. Both men and women are developing more Breast cancer cases every day. Breast cancer has become a huge health concerning issue. If Breast cancer is detected in early stages like stages 0 and 1, it can be cured without too much health risk which will reduce the death rate. Computer-Aided Detection or CAD systems are available to detect whether a woman or man has Breast cancer or not. The purpose of our research paper is to find a technique or algorithm that can help in the early detection of Breast cancer to save lives and reduce casualties. Here, different Machine Learning (ML) algorithms like decision tree, Support vector machine, ensemble algorithm of random forest with bagging and Ada boosting, and Voting Classifier are used. Breast cancer prediction with a Voting Classifier on ensemble algorithms is built. The performance of applied models is analyzed in terms of Accuracy, Precision, Recall, F1-score, and Support. The Voting Classifier gives the best results with 0.96 Accuracy because it uses the mean of ensemble algorithms to improve Accuracy value.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"185 1","pages":"653-660"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83042534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forest Fire Classification and Detection in Aerial Images using Inception-V3 and SSD Models 基于Inception-V3和SSD模型的航空图像森林火灾分类和检测
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053522
Sravya Sri Jandhyala, Ranga Rao Jalleda, Deepthi Meenakshi Ravuri
Wildfires contribute to a lot of damage than what is visible. A significant population of a wide variety of species can easily disappear in a single wildfire if unnoticed. The human population including tribes, forest department staff, and rescuers too often lose their lives in wildfires. The unnoticed damage includes high carbon emission, heat waves, the amount of time that takes to rebuild such a green environment, etc. The impact of such wildfires can be highly reduced if detected at an earlier stage. This study has used a Convolutional Neural Network (CNN) based Inception-V3 model, which classifies a given aerial image based on the presence of fire or smoke, and a Single Shot Detector model that detects the fire or smoke areas in the image. These models were trained on aerial imagery using transfer learning which led to an overall accuracy of 88% for classification and 91% for detection. These models can be used to detect fires in live images captured by aerial vehicles helping the disaster management entities to react and respond immediately and accordingly.
野火造成的破坏比可见的要大得多。如果不被注意,大量种类繁多的物种很容易在一场野火中消失。包括部落、森林部门工作人员和救援人员在内的人口经常在野火中丧生。未被注意到的损害包括高碳排放、热浪、重建这样一个绿色环境所需的时间等。如果及早发现,可以大大减少这类野火的影响。这项研究使用了基于卷积神经网络(CNN)的Inception-V3模型,该模型根据是否存在火灾或烟雾对给定的航拍图像进行分类,以及检测图像中火灾或烟雾区域的Single Shot Detector模型。这些模型使用迁移学习在航空图像上进行训练,导致分类的总体准确率为88%,检测的总体准确率为91%。这些模型可用于在飞行器捕获的实时图像中探测火灾,帮助灾害管理实体立即作出相应的反应和响应。
{"title":"Forest Fire Classification and Detection in Aerial Images using Inception-V3 and SSD Models","authors":"Sravya Sri Jandhyala, Ranga Rao Jalleda, Deepthi Meenakshi Ravuri","doi":"10.1109/IDCIoT56793.2023.10053522","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053522","url":null,"abstract":"Wildfires contribute to a lot of damage than what is visible. A significant population of a wide variety of species can easily disappear in a single wildfire if unnoticed. The human population including tribes, forest department staff, and rescuers too often lose their lives in wildfires. The unnoticed damage includes high carbon emission, heat waves, the amount of time that takes to rebuild such a green environment, etc. The impact of such wildfires can be highly reduced if detected at an earlier stage. This study has used a Convolutional Neural Network (CNN) based Inception-V3 model, which classifies a given aerial image based on the presence of fire or smoke, and a Single Shot Detector model that detects the fire or smoke areas in the image. These models were trained on aerial imagery using transfer learning which led to an overall accuracy of 88% for classification and 91% for detection. These models can be used to detect fires in live images captured by aerial vehicles helping the disaster management entities to react and respond immediately and accordingly.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"53 6 1","pages":"320-325"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83224934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Concept for Value Stream-Oriented Analyses of Event-based Data in Three Perspectives 基于事件的数据价值流分析的概念
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053516
N. Scheder, Tim Teriete, Stefanie Eisl, Mathias Nausch, Markus Böhm
Value stream mapping is an established method for analyzing and optimizing manufacturing systems. However, because of their high complexity and dynamic behavior, modern production systems of the industry 4.0 era are increasingly difficult to model in a static value stream map. A general approach to handle this challenge is to digitalize analysis, modeling, and visualization. This study shows how information gathered digitally during value stream analysis can be structured in a way to provide added value for users in visualization. For this purpose, three perspectives are derived and described in detail – ‘value stream map’, ‘order tracking’ and ‘resource monitoring’. These perspectives are also intended to cover sustainability KPIs and be real-time capable. The approach exploits standardized event data to ensure processing and development. It contributes to the utilization of data in the manufacturing context.
价值流图是制造系统分析和优化的常用方法。然而,由于工业4.0时代的现代生产系统的高复杂性和动态行为,在静态价值流图中建模越来越困难。应对这一挑战的一般方法是数字化分析、建模和可视化。本研究展示了如何在价值流分析过程中以数字化方式收集信息,以可视化的方式为用户提供附加价值。为此,本文导出并详细描述了三个视角——“价值流图”、“订单跟踪”和“资源监控”。这些视角还旨在涵盖可持续性kpi,并具有实时能力。该方法利用标准化的事件数据来确保处理和开发。它有助于在制造环境中利用数据。
{"title":"Concept for Value Stream-Oriented Analyses of Event-based Data in Three Perspectives","authors":"N. Scheder, Tim Teriete, Stefanie Eisl, Mathias Nausch, Markus Böhm","doi":"10.1109/IDCIoT56793.2023.10053516","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053516","url":null,"abstract":"Value stream mapping is an established method for analyzing and optimizing manufacturing systems. However, because of their high complexity and dynamic behavior, modern production systems of the industry 4.0 era are increasingly difficult to model in a static value stream map. A general approach to handle this challenge is to digitalize analysis, modeling, and visualization. This study shows how information gathered digitally during value stream analysis can be structured in a way to provide added value for users in visualization. For this purpose, three perspectives are derived and described in detail – ‘value stream map’, ‘order tracking’ and ‘resource monitoring’. These perspectives are also intended to cover sustainability KPIs and be real-time capable. The approach exploits standardized event data to ensure processing and development. It contributes to the utilization of data in the manufacturing context.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"16 1","pages":"228-233"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motion Estimating Optical Flow for Action Recognition : (FARNEBACK, HORN SCHUNCK, LUCAS KANADE AND LUCAS-KANADE DERIVATIVE OF GAUSSIAN) 用于动作识别的运动估计光流:(FARNEBACK, HORN SCHUNCK, LUCAS KANADE和LUCAS-KANADE高斯导数)
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053515
Rosepreet Kaur Bhogal, V. Devendran
Motion estimating is one of the methods which determines the movement from one frame to another in the videos. For an application of action recognition, choosing the optical flow can be an essential feature for recognizing actions. The optical flow consists of the information of the moving subject and objects in the video frames. This paper analyzes four motion estimating optical flow methods (Farneback, Horn Schunck, Lucas Kanade, and Lucas-Kanade Derivative of Gaussian explored based on visualization and PSNR. The NTURGB+D dataset uses for the analysis of experimental results.
运动估计是确定视频中从一帧到另一帧的运动的方法之一。在动作识别的应用中,选择光流是动作识别的一个重要特征。光流由视频帧中运动主体和物体的信息组成。本文分析了基于可视化和PSNR的四种运动估计光流方法(Farneback、Horn Schunck、Lucas Kanade和Lucas-Kanade Gaussian导数)。NTURGB+D数据集用于分析实验结果。
{"title":"Motion Estimating Optical Flow for Action Recognition : (FARNEBACK, HORN SCHUNCK, LUCAS KANADE AND LUCAS-KANADE DERIVATIVE OF GAUSSIAN)","authors":"Rosepreet Kaur Bhogal, V. Devendran","doi":"10.1109/IDCIoT56793.2023.10053515","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053515","url":null,"abstract":"Motion estimating is one of the methods which determines the movement from one frame to another in the videos. For an application of action recognition, choosing the optical flow can be an essential feature for recognizing actions. The optical flow consists of the information of the moving subject and objects in the video frames. This paper analyzes four motion estimating optical flow methods (Farneback, Horn Schunck, Lucas Kanade, and Lucas-Kanade Derivative of Gaussian explored based on visualization and PSNR. The NTURGB+D dataset uses for the analysis of experimental results.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"28 1","pages":"675-682"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88293958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Energy Meter and Monitoring System using Internet of Things (IoT) 基于物联网的智能电表监控系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053541
M. Karpagam, S. S, S. S, Soundhariyasri S
In recent times, the energy calibration methods are universally expanding with the goal of effectuating, reliably operating, and managing the utility system. The growing demand for power in the current environment has necessitated the mandatory installation of energy meters, as well as the development of new methods for calibrating meter readings and governing the effective use of energy resources. AMR (Automatic Meter Reading system) is one such modernization. This employs analogue or digital energy meters with the assistance of smart meters. Currently, energy scaling is done by hand, which is a timeconsuming process in the world of day-to-day networking demand and also requires skilled labour. The concept of AMR Systems is to overcome complexities in the rapidly growing field of energy management. This article proposes a smart energy meter based on IoT to detect the power theft. The proposed model consists of Arduino UNO, ESP8266, AC713 current sensors, and so on. The AC713 senses current usage with the help of the ESP32, which is then passed to the IoT platform. Though AMR is a very effective method, it costs the proxy of existing energy meters by SEM (Smart energy meters), which is highly inefficient. As a result, the proposed method focuses on detecting the power theft caused by public tampering. The proposed model is programmed by using a BLYNK software and simulated in PROTEUS software. The proposed system is then validated by using the simulated results.
近年来,以实现电力系统的有效运行和管理为目标,能源校准方法得到了广泛的发展。在当前的环境中,对电力日益增长的需求使得必须强制安装电能表,以及开发校准电表读数和管理有效利用能源的新方法。AMR(自动抄表系统)就是这样一个现代化。这采用模拟或数字电能表与智能电表的帮助。目前,能源扩容是手工完成的,在日常网络需求的世界中,这是一个耗时的过程,也需要熟练的劳动力。AMR系统的概念是为了克服快速发展的能源管理领域的复杂性。本文提出了一种基于物联网的智能电能表来检测窃电。提出的模型由Arduino UNO、ESP8266、AC713电流传感器等组成。AC713在ESP32的帮助下感知当前的使用情况,然后将其传递到物联网平台。虽然AMR是一种非常有效的方法,但它需要用SEM(智能电能表)代替现有的电能表,效率很低。因此,该方法的重点是检测由公开篡改引起的电力盗窃。利用BLYNK软件对模型进行了编程,并在PROTEUS软件中进行了仿真。利用仿真结果对所提出的系统进行了验证。
{"title":"Smart Energy Meter and Monitoring System using Internet of Things (IoT)","authors":"M. Karpagam, S. S, S. S, Soundhariyasri S","doi":"10.1109/IDCIoT56793.2023.10053541","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053541","url":null,"abstract":"In recent times, the energy calibration methods are universally expanding with the goal of effectuating, reliably operating, and managing the utility system. The growing demand for power in the current environment has necessitated the mandatory installation of energy meters, as well as the development of new methods for calibrating meter readings and governing the effective use of energy resources. AMR (Automatic Meter Reading system) is one such modernization. This employs analogue or digital energy meters with the assistance of smart meters. Currently, energy scaling is done by hand, which is a timeconsuming process in the world of day-to-day networking demand and also requires skilled labour. The concept of AMR Systems is to overcome complexities in the rapidly growing field of energy management. This article proposes a smart energy meter based on IoT to detect the power theft. The proposed model consists of Arduino UNO, ESP8266, AC713 current sensors, and so on. The AC713 senses current usage with the help of the ESP32, which is then passed to the IoT platform. Though AMR is a very effective method, it costs the proxy of existing energy meters by SEM (Smart energy meters), which is highly inefficient. As a result, the proposed method focuses on detecting the power theft caused by public tampering. The proposed model is programmed by using a BLYNK software and simulated in PROTEUS software. The proposed system is then validated by using the simulated results.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"18 1","pages":"75-80"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72681109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain in Indian Agriculture to Disrupt the Food Supply Chain 印度农业区块链将颠覆食品供应链
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053406
G. Singh, Virat Singh Tomer, Alok Pandey, Rajendra Kumar Dwivedi
The Supply chain was always a complex task to manage the integrity, accountability, traceability, and quality of the products. The food supply chain is more important than any other supply chain. India is the second largest producer of fruits and vegetables in the world succeeding China. Although having a low level of processing, the quality of the final produced goods is not properly matched. Due to the lack of proper management in the food supply chain, many unauthorized small food organizations produce false products that are harmful to health. The modern supply chain is useful to prevent potential fraud a guarantees trade compliance. Blockchain technology solves the problem of complexity in the food supply chain. Blockchain uses a decentralized ledger to store the information, and this information cannot be changed or modified. Blockchain technology provides traceability, transparency, trust, and an immutable decentralized ledger to store data. In the existing blockchain based models, database consumption is very high. So, the proposed model introduces the concept of two parallel blockchain servers to optimize database usage.
供应链一直是一项复杂的任务,要管理产品的完整性、责任、可追溯性和质量。食品供应链比其他任何供应链都重要。印度是继中国之后的世界第二大水果和蔬菜生产国。虽然加工水平较低,但最终生产出来的产品质量不匹配。由于食品供应链缺乏适当的管理,许多未经授权的小型食品组织生产有害健康的虚假产品。现代供应链有助于防止潜在的欺诈,并保证贸易合规。区块链技术解决了食品供应链的复杂性问题。区块链使用去中心化的分类账来存储信息,并且这些信息不能被更改或修改。区块链技术提供可追溯性、透明度、信任和不可变的去中心化分类账来存储数据。在现有的基于区块链的模型中,数据库消耗非常高。因此,提出的模型引入了两个并行区块链服务器的概念,以优化数据库的使用。
{"title":"Blockchain in Indian Agriculture to Disrupt the Food Supply Chain","authors":"G. Singh, Virat Singh Tomer, Alok Pandey, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053406","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053406","url":null,"abstract":"The Supply chain was always a complex task to manage the integrity, accountability, traceability, and quality of the products. The food supply chain is more important than any other supply chain. India is the second largest producer of fruits and vegetables in the world succeeding China. Although having a low level of processing, the quality of the final produced goods is not properly matched. Due to the lack of proper management in the food supply chain, many unauthorized small food organizations produce false products that are harmful to health. The modern supply chain is useful to prevent potential fraud a guarantees trade compliance. Blockchain technology solves the problem of complexity in the food supply chain. Blockchain uses a decentralized ledger to store the information, and this information cannot be changed or modified. Blockchain technology provides traceability, transparency, trust, and an immutable decentralized ledger to store data. In the existing blockchain based models, database consumption is very high. So, the proposed model introduces the concept of two parallel blockchain servers to optimize database usage.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"42 1","pages":"171-177"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75229219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Web Application for Accessing & Managing e - Resources 电子资源访问与管理Web应用程序的开发
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053413
Amol Gothi, Dhiraj Mandal, Kshitij Bangde, Surabhi Ghogare, P. Rajarapollu
Recently in the last few years there has been a drastic transition in the digital era. Education system is also not skipped through this phase of change. Due to the pandemic situation, the online education system was the only solution. To make online education more effective, quality proof, enjoyable and easier, an e library system has been developed. E-library is a platform where all the E-Books, Research papers, Articles, Journals, Study material are available for the students. After the proper authentication, students are able to login the system and have the benefit of all study material available from the institutional server. Three level securities are adopted to avoid unauthorized access to system and management of study data material. E-Library is playing a major role in enhancing students' interest in learning process, referring and reading the books. E-Library is also having an important role in self and sustainable growth of individual.
最近,在过去的几年里,数字时代发生了巨大的转变。教育系统也没有跳过这一阶段的变革。由于疫情形势,在线教育系统是唯一的解决方案。为了使在线教育更有效、更有质量保证、更愉快、更容易,我们开发了一个电子图书馆系统。电子图书馆是一个为学生提供所有电子图书、研究论文、文章、期刊、学习资料的平台。经过适当的认证后,学生可以登录系统,并从机构服务器上获得所有学习资料。采用三级安全措施,避免未经授权访问系统和管理研究数据资料。电子图书馆在提高学生学习过程、参考和阅读图书的兴趣方面发挥着重要作用。电子图书馆在促进个人自我和可持续发展方面也发挥着重要作用。
{"title":"Development of Web Application for Accessing & Managing e - Resources","authors":"Amol Gothi, Dhiraj Mandal, Kshitij Bangde, Surabhi Ghogare, P. Rajarapollu","doi":"10.1109/IDCIoT56793.2023.10053413","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053413","url":null,"abstract":"Recently in the last few years there has been a drastic transition in the digital era. Education system is also not skipped through this phase of change. Due to the pandemic situation, the online education system was the only solution. To make online education more effective, quality proof, enjoyable and easier, an e library system has been developed. E-library is a platform where all the E-Books, Research papers, Articles, Journals, Study material are available for the students. After the proper authentication, students are able to login the system and have the benefit of all study material available from the institutional server. Three level securities are adopted to avoid unauthorized access to system and management of study data material. E-Library is playing a major role in enhancing students' interest in learning process, referring and reading the books. E-Library is also having an important role in self and sustainable growth of individual.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"37 1","pages":"234-238"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76013377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence in Children with Special Need Education 人工智能在特殊需要儿童教育中的应用
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053420
C. Neeharika, Y. Riyazuddin
Students with special need education (SNE) can now benefit from new forms of interaction made possible by special educational needs. Recently artificial intelligent technologies have been among the most successful in recent decades (between 2001 and 2010). AI approaches are considered as a tool to improve the eminence of children with special needs. As a result, AI must be implemented. Content analysis was used to examine the replies. Research focused on whether the literature covered the topics of AI's influence on (a) SNE and (b) AI's ability to enable instructors to promote Special Needs Education. The study also attempted, through in-depth interviews, to provide a framework for a more inclusive future for special-needs education. As a result of the employment of AI, children with special needs and educational institutions alike have been affected. There has been a lot of attention paid to students with special needs in this paper, which looks at how AI affects their education. The proposed study has also implemented a data-driven approach to classify autism spectrum disorder (ASD) patients and typically developing (TD) participants data.
有特殊教育需要的学生现在可以从特殊教育需要带来的新形式的互动中受益。最近,人工智能技术是近几十年来(2001年至2010年)最成功的技术之一。人工智能方法被认为是提高有特殊需要的儿童的卓越性的工具。因此,必须实施人工智能。内容分析用于检查回复。研究的重点是文献是否涵盖了人工智能对(a) SNE的影响以及(b)人工智能使教师能够促进特殊需要教育的能力。这项研究还试图通过深入访谈,为特殊需要教育的更具包容性的未来提供一个框架。由于使用人工智能,有特殊需要的儿童和教育机构都受到影响。本文对有特殊需求的学生进行了大量关注,研究了人工智能如何影响他们的教育。该研究还实施了一种数据驱动的方法来分类自闭症谱系障碍(ASD)患者和典型发展(TD)参与者的数据。
{"title":"Artificial Intelligence in Children with Special Need Education","authors":"C. Neeharika, Y. Riyazuddin","doi":"10.1109/IDCIoT56793.2023.10053420","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053420","url":null,"abstract":"Students with special need education (SNE) can now benefit from new forms of interaction made possible by special educational needs. Recently artificial intelligent technologies have been among the most successful in recent decades (between 2001 and 2010). AI approaches are considered as a tool to improve the eminence of children with special needs. As a result, AI must be implemented. Content analysis was used to examine the replies. Research focused on whether the literature covered the topics of AI's influence on (a) SNE and (b) AI's ability to enable instructors to promote Special Needs Education. The study also attempted, through in-depth interviews, to provide a framework for a more inclusive future for special-needs education. As a result of the employment of AI, children with special needs and educational institutions alike have been affected. There has been a lot of attention paid to students with special needs in this paper, which looks at how AI affects their education. The proposed study has also implemented a data-driven approach to classify autism spectrum disorder (ASD) patients and typically developing (TD) participants data.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"112 1","pages":"519-523"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79384596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lifting Wavelet Transform based FBMC for Visible Light Communication System 基于提升小波变换的FBMC可见光通信系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053421
V. G. Krishnan, J. Deepa, G. Vishnupriya, B. S. Gowri, S. Raja
Lifting Wavelet Transform (LWT) and Pulse Amplitude Modulation (PAM)-based FBMC in VLC will lessen the difficulty of signal processing and address the test of VLC by simplifying the signal processing. Single and four-level LWT-based filter bank multi-carrier (FBMC) simulations using 4-PAM for VLC systems with various wavelet levels have been successfully simulated in this paper. LWT-FBMC is compared to FFT-FBMC using QPSK and 4-QAM and DCT-FBMC using 4-PAM in terms of BER and PAPR. For various channel conditions that are modelled, the BER of LWT-FBMC is lower than that of FFT-FBMC and DCT-FBMC. LWT-FBMC reaches 10-3 at SNR 17dB and 18dB, whereas FFT-FBMC reaches 10-3 at SNR 23dB for =0o and 10o BER. The BER of DCT-FBMC, on the other hand, can only be reduced to a minimum of 10-2 with an SNR of 40 dB. The BER and PAPR are reduced by four levels of LWT-FBMC. Four-level DWT-FBMC using db1 (7.7753 dB) and haar (7.7995 dB) has a lower PAPR than FFT-FBMC, which has a higher PAPR. This study goes into great detail about how the investigation was carried out.
在VLC中提升基于小波变换(LWT)和脉冲调幅(PAM)的FBMC,通过简化信号处理,降低了信号处理的难度,解决了VLC的测试问题。本文利用4-PAM对不同小波电平的VLC系统进行了单电平和四电平lwt滤波器组多载波(FBMC)仿真。在BER和PAPR方面,LWT-FBMC与使用QPSK和4-QAM的FFT-FBMC和使用4-PAM的DCT-FBMC进行了比较。在模拟的各种信道条件下,LWT-FBMC的误码率低于FFT-FBMC和DCT-FBMC。LWT-FBMC在信噪比为17dB和18dB时达到10-3,而FFT-FBMC在信噪比为23dB时达到10-3。另一方面,DCT-FBMC的误码率只能在信噪比为40 dB的情况下降低到10-2。LWT-FBMC降低了4个等级的BER和PAPR。使用db1 (7.7753 dB)和haar (7.7995 dB)的四电平DWT-FBMC的PAPR比FFT-FBMC低,而FFT-FBMC的PAPR更高。这项研究非常详细地介绍了调查是如何进行的。
{"title":"Lifting Wavelet Transform based FBMC for Visible Light Communication System","authors":"V. G. Krishnan, J. Deepa, G. Vishnupriya, B. S. Gowri, S. Raja","doi":"10.1109/IDCIoT56793.2023.10053421","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053421","url":null,"abstract":"Lifting Wavelet Transform (LWT) and Pulse Amplitude Modulation (PAM)-based FBMC in VLC will lessen the difficulty of signal processing and address the test of VLC by simplifying the signal processing. Single and four-level LWT-based filter bank multi-carrier (FBMC) simulations using 4-PAM for VLC systems with various wavelet levels have been successfully simulated in this paper. LWT-FBMC is compared to FFT-FBMC using QPSK and 4-QAM and DCT-FBMC using 4-PAM in terms of BER and PAPR. For various channel conditions that are modelled, the BER of LWT-FBMC is lower than that of FFT-FBMC and DCT-FBMC. LWT-FBMC reaches 10-3 at SNR 17dB and 18dB, whereas FFT-FBMC reaches 10-3 at SNR 23dB for =0o and 10o BER. The BER of DCT-FBMC, on the other hand, can only be reduced to a minimum of 10-2 with an SNR of 40 dB. The BER and PAPR are reduced by four levels of LWT-FBMC. Four-level DWT-FBMC using db1 (7.7753 dB) and haar (7.7995 dB) has a lower PAPR than FFT-FBMC, which has a higher PAPR. This study goes into great detail about how the investigation was carried out.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"46 1","pages":"595-599"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80489515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart E-Locker System using IoT 使用物联网的智能电子储物柜系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053507
Keerti R. Umadi, Adoni Aishwarya, Jyothi E Narendramath, Inchara S M, P. P. Priya Dharishini
In order to enhance daily life and actualize the Internet-of-Things (IoT) goal, several IoT gadgets have been created. IoT, which is based on the information-sharing capabilities of Radio Frequency Identification (RFID), is developing into one of the key technologies that is being used in a wide range of applications. Security and Privacy are necessities in today’s world. Security systems are being used exponentially more frequently in our daily lives and we all know that this is an information era where all transactions are through the exchange of data. The idea behind this smart e-locker system primarily came from the asset security system utilized in bank lockers. This smart e-locker system, triggers an alarm when a user attempts to enter a guarded area by scanning an unregistered token. This system includes unique and personalized tags that allow only the authorized user to enter the secured premises. The most unique feature is that the log of the number of people approach the locker or the secured area is stored in adafruit cloud. If an unauthorized user is trying to enter the secured area by scanning the unregistered token the buzzer will be activated automatically causing the guards to be notified and an alert is send to person in-charge through e-mail. This paper demonstrates how RFID technology improves security and convenience, which will be useful in the future.
为了改善日常生活并实现物联网(IoT)的目标,一些物联网设备已经被创造出来。以无线射频识别(RFID)的信息共享能力为基础的物联网(IoT)正在发展成为广泛应用的关键技术之一。安全和隐私是当今世界的必需品。在我们的日常生活中,安全系统的使用频率呈指数级增长,我们都知道这是一个信息时代,所有的交易都是通过交换数据进行的。这种智能电子储物柜系统背后的想法主要来自银行储物柜中使用的资产安全系统。这个智能电子储物柜系统,当用户试图通过扫描未注册的令牌进入有人看守的区域时,会触发警报。该系统包括唯一和个性化的标签,只允许授权用户进入受保护的场所。最独特的特点是,接近储物柜或安全区域的人数日志存储在水果云中。如果未经授权的用户试图通过扫描未注册的令牌进入安全区域,蜂鸣器将自动激活,从而通知警卫并通过电子邮件向负责人发送警报。本文展示了RFID技术如何提高安全性和便利性,这在未来将是有用的。
{"title":"Smart E-Locker System using IoT","authors":"Keerti R. Umadi, Adoni Aishwarya, Jyothi E Narendramath, Inchara S M, P. P. Priya Dharishini","doi":"10.1109/IDCIoT56793.2023.10053507","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053507","url":null,"abstract":"In order to enhance daily life and actualize the Internet-of-Things (IoT) goal, several IoT gadgets have been created. IoT, which is based on the information-sharing capabilities of Radio Frequency Identification (RFID), is developing into one of the key technologies that is being used in a wide range of applications. Security and Privacy are necessities in today’s world. Security systems are being used exponentially more frequently in our daily lives and we all know that this is an information era where all transactions are through the exchange of data. The idea behind this smart e-locker system primarily came from the asset security system utilized in bank lockers. This smart e-locker system, triggers an alarm when a user attempts to enter a guarded area by scanning an unregistered token. This system includes unique and personalized tags that allow only the authorized user to enter the secured premises. The most unique feature is that the log of the number of people approach the locker or the secured area is stored in adafruit cloud. If an unauthorized user is trying to enter the secured area by scanning the unregistered token the buzzer will be activated automatically causing the guards to be notified and an alert is send to person in-charge through e-mail. This paper demonstrates how RFID technology improves security and convenience, which will be useful in the future.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"65 1","pages":"41-45"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85790164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
物联网技术
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1