2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

筛选
英文 中文
Future Driver Assistant with Reconfigurable On-Board Diagnostics system 具有可重构车载诊断系统的未来驾驶助理
V. A, S. Vanaja, B. Sathyasri, R. S., Ramyaa D, Prem S
{"title":"Future Driver Assistant with Reconfigurable On-Board Diagnostics system","authors":"V. A, S. Vanaja, B. Sathyasri, R. S., Ramyaa D, Prem S","doi":"10.1109/I-SMAC52330.2021.9640737","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640737","url":null,"abstract":"Nowadays, automation is the most efficient resource mechanism which is available in day today life in an economical way. In daily circumstances, life is not possible without automotive mechanism. The automotive method adopted in this system would be by displaying the various parameters through an informative system. So, our aim is to develop an informative system to indicate multiple parameters of the automobile resources like fuel, engine temperature, AC voltage in engine, air, battery voltage, wear out temperature, hydrocarbons quantity and machine speed. The proposed system is useful for any users for recognizing the various parameters in a single and compact Liquid Crystal Display. A voice recorder Integrated Circuit has been used in this project to produce warning voice signals during abnormal conditions of resources. This project involves the usage of the latest embedded microcontroller. In case of any abnormal situations some points are set to stir the end user for the itemize specifications as well as for each and every action is -taking place is stipulated with the help of voice output.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126060181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Software Simulation in Guiding Reform of Engineering Project with VR Tools 软件仿真在VR工具指导工程项目改革中的应用
Jianhua Li
{"title":"Application of Software Simulation in Guiding Reform of Engineering Project with VR Tools","authors":"Jianhua Li","doi":"10.1109/I-SMAC52330.2021.9640666","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640666","url":null,"abstract":"BIM is a kind of engineering data model which can integrate all kinds of information in the whole process of construction engineering. It is based on three-dimensional digital technology and provides the basis for collaborative work. It can integrate all kinds of information data and set up simulation model by setting parameters to simulate building entity, construction process and operation situation. Based on the secondary development technology of engineering software, this paper studies API development tools. Through the establishment of parametric family library, this paper develops a rapid modeling method for rapid generation of water conservancy and hydropower project model, and finally realizes the construction schedule simulation by using the cooperation of VR tool related software and NavisWorks software.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126828836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Advance Pill Reminder System for Distinct Patients 基于物联网的不同患者提前提醒系统
Abhishek A. Madankar, Akhilesh Agrawal, Vedant Yede
{"title":"IoT based Advance Pill Reminder System for Distinct Patients","authors":"Abhishek A. Madankar, Akhilesh Agrawal, Vedant Yede","doi":"10.1109/I-SMAC52330.2021.9640866","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640866","url":null,"abstract":"When it comes to loved ones, humans strive to keep them fit and healthy at all times. But what if they forget to take their medicine and become ill as a result? Hence, many patients require medication at the health care center, and it is difficult for us to remind each patient to take medicine at a specific time. Traditional way requires lot of human effort to remind the patient to take medicine. But in this digital era, humans make use of machines to do certain works. Pill remainder has a wide range of uses, including use by patients at home, doctors in hospitals, and a variety of other settings. This paper presents a working of advance pill remainder setup, which can remove asymmetry in taking medicine dosages and remind the patient to take medicine at prescribed time and particular number of dosages. In this approach, the users are switching from human memory to automated supervision.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"2 6-7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A detailed study on sentimental analysis using Twitter data with an Improved deep learning model 使用改进的深度学习模型对Twitter数据进行情感分析的详细研究
Bhavani M, Shrijeeth S, Rohit M, Sanjeev Krishnan R, Sharveshwaran R
{"title":"A detailed study on sentimental analysis using Twitter data with an Improved deep learning model","authors":"Bhavani M, Shrijeeth S, Rohit M, Sanjeev Krishnan R, Sharveshwaran R","doi":"10.1109/I-SMAC52330.2021.9640850","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640850","url":null,"abstract":"Under the present developments and current situation, the entire globe is changing fast. With the Internet being utilized in every sector, the internet has become a necessary requirement for everyone. With the quick expansion in informal community applications, individuals are utilizing these stages to voice their sentiments as to everyday issues. Assembling and investigating people's reactions toward purchasing an item, public administrations are essential. Sentiment analysis is a common dialogue preparing task that aims to discover the sentiments behind opinions in texts on varying subjects [1]. As of late, analysts in the field of estimation examination have been worried about dissecting suppositions on various subjects, for example, films, business items, and day by day cultural issues. Twitter is a gigantically mainstream microblog on which customers may voice their assessments. Assessment examination of Twitter information is a field that has been given a lot of consideration in the course of the most recent decade and includes taking apart \"tweets\" and the substance of these articulations. In this paper, a deep learning model has been made with Embedding, CNN and LSTM layers. Then tweets from the web are collected for a particular topic using the Web Scraping technique by Twitter API and the overall sentiment is analyzed and a detailed sentiment report is made for that particular topic.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of different video steganography approaches against man-in-the middle attacks 针对中间人攻击的不同视频隐写方法综述
V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad
{"title":"A Survey of different video steganography approaches against man-in-the middle attacks","authors":"V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad","doi":"10.1109/I-SMAC52330.2021.9640974","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640974","url":null,"abstract":"Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded Network Database Encryption System Optimization Considering the B/S Structure and Software Optimization 考虑B/S结构和软件优化的嵌入式网络数据库加密系统优化
Qinmin Ma
{"title":"Embedded Network Database Encryption System Optimization Considering the B/S Structure and Software Optimization","authors":"Qinmin Ma","doi":"10.1109/I-SMAC52330.2021.9640735","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640735","url":null,"abstract":"With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information systems. The database management system comes with a basic security technology strategy, which can solve common database security requirements. However, for some special data security applications, the security technology strategy of the database itself cannot meet the requirements, which requires data encryption. Processing data encryption is the core content of information security research, and database encryption is an important means to improve database security. This paper studies the design of embedded network database system based on BS structure.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133240044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Enhancement based on Deep Convolutional Neural Network 基于深度卷积神经网络的语音增强
Ramesh Nuthakki, Payel Masanta, Yukta T N
{"title":"Speech Enhancement based on Deep Convolutional Neural Network","authors":"Ramesh Nuthakki, Payel Masanta, Yukta T N","doi":"10.1109/I-SMAC52330.2021.9640736","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640736","url":null,"abstract":"Speech enhancement is the process of treating noisy speech signals so as to improve human perception as well as improve system understanding of the signal. For speech signals with medium or high signal to noise ratio (SNR), the aim is to produce subjectively pragmatic signal, and for signals having low SNR the aim is to reduce the noise while still maintaining the intelligibility. Many noise reduction algorithms improve overall speech quality but little progress has been made to improve the overall speech intelligibility. This paper proposes a deep convolutional neural network (DCNN) speech enhancement method by enhancing loss function such as extended short time objective ineligibility (ESTOI) and mean square error (MSE). These loss functions are improved using Harris Hawks Optimization (HHO). The enhanced speech signal is acquired by separating the clean speech signal from the noisy speech signal. By using various predictive measure of objective speech intelligibility like short time objective intelligibility, source to artefact ratio (SAR), coherence speech intelligibility index (CSII) and source to distortion ratio (SDR), the efficacy of speech enhancement is calculated. The quality of the enhanced speech signal is assessed using the quality measure such as speech distortion (SD) and perceptual evaluation of speech quality (PESQ).","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Intrusion Detection using Machine Learning Approaches 使用机器学习方法的网络入侵检测
Zakir Hossain, Md. Mahmudur Rahman Sourov, Musharrat Khan, Parves Rahman
{"title":"Network Intrusion Detection using Machine Learning Approaches","authors":"Zakir Hossain, Md. Mahmudur Rahman Sourov, Musharrat Khan, Parves Rahman","doi":"10.1109/I-SMAC52330.2021.9640949","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640949","url":null,"abstract":"At present network intrusion is regarded as a great threat in network usage and communication. Network intrusion detection system detects and prevents anomalous activities or attacks in networks. Many classifiers are used to detect network attacks. In this paper, we have evaluated the performance of four popular classifiers, namely, Decision Tree, Support Vector Machine, Random Forest and Naïve Bayes on UNSW-NB15 dataset using Python language along with its Pandas and SKlearn libraries. We have used the complete UNSW-NB15 dataset with 43 features. Experimental results have shown improvement of accuracy for Random Forest, Decision Tree and Naïve Bayes over previously reported results produced by Apache Spark and its MLlib.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134571525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Power Load Forecasting Model Based on Intelligent Optimization Algorithm 基于智能优化算法的电力负荷预测模型分析
Jianli Jiao
{"title":"Analysis of Power Load Forecasting Model Based on Intelligent Optimization Algorithm","authors":"Jianli Jiao","doi":"10.1109/I-SMAC52330.2021.9640687","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640687","url":null,"abstract":"In recent years, the complex relationship between power supply and demand and economic growth has caused governments, enterprises and a large number of scientific researchers to pay attention to the internal relationship of power supply and demand forecasting. Power load forecasting has become a management task, science and power science, computer science and other fields. Research hotspots. This paper constructs a mathematical model and application prototype system based on intelligent optimization algorithms, predicts short-term and mid-to-long-term power load trends in my country, and analyzes the supply and demand situation of the power industry.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124309679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Artificial Intelligence New Infrastructure Standardization and Intelligent Framework Design 企业人工智能新基础设施标准化与智能框架设计
Shengfeng Jiang, Lei Jiang
{"title":"Enterprise Artificial Intelligence New Infrastructure Standardization and Intelligent Framework Design","authors":"Shengfeng Jiang, Lei Jiang","doi":"10.1109/I-SMAC52330.2021.9640877","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640877","url":null,"abstract":"New infrastructure is an infrastructure based on emerging technology, especially a new generation of information technology. It is the foundation and guarantee for the digital transformation and high-quality development of traditional businesses. It has the characteristics of new technology, new ecology and new power; standardization and intelligence are the promotion of new infrastructure The key to innovation and development is the foundation, guarantee and support for its function; this article studies the design of the standardization and intelligent framework of enterprise artificial intelligence new infrastructure.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信