2023 World Conference on Communication & Computing (WCONF)最新文献

筛选
英文 中文
Routing Techniques in Body Sensor Network System for Healthcare: Applications, Challenges, and Research Trends 医疗保健身体传感器网络系统中的路由技术:应用、挑战和研究趋势
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235256
Chetan Pandey, Sachin Sharma, Priya Matta
{"title":"Routing Techniques in Body Sensor Network System for Healthcare: Applications, Challenges, and Research Trends","authors":"Chetan Pandey, Sachin Sharma, Priya Matta","doi":"10.1109/WCONF58270.2023.10235256","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235256","url":null,"abstract":"Pre-analysis of health using sensor technologies will become quite popular during this decade and will be used by the common citizen as well. Transmission of body parameters is crucial in the Body Sensor Network (BSN) system because erroneous transmission can result in a number of problems, including energy waste, transmission delays, data loss, decreased stability, and poor data transfer efficiency. In the last ten years, many research were done to address these problems, particularly in light of the development of biosensors. This paper will discuss many research projects based on various BSN routing techniques. The author described innovative work completed for effective information transmission in a BSN and demonstrated a comparison study based on six crucial parameters: stability, network lifetime, energy efficient, reliable, network delay, and throughput. The author also discusses various challenges and research trends that have been reported by various authors throughout their research.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the Performance of Bluetooth Technology by Sensor Monitoring in Industrial WSN 基于传感器监测的蓝牙技术在工业无线传感器网络中的性能研究
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235061
Romil Jain
{"title":"Investigating the Performance of Bluetooth Technology by Sensor Monitoring in Industrial WSN","authors":"Romil Jain","doi":"10.1109/WCONF58270.2023.10235061","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235061","url":null,"abstract":"The use of Bluetooth technology in industrial Wireless Sensor Networks (WSN) offers performance benefits, such as high network throughput, scalability, and extended range. As such, it has become a popular choice for performing critical industrial monitoring operations that require constant monitoring of multiple sensors distributed throughout a factory or warehouse. This paper examines the performance of a Bluetooth WSN in an industrial setting, and evaluates the advantages of using Bluetooth for sensor monitoring. Results from real-world deployments are presented as well as simulations, making up a comprehensive picture of the benefits of using Bluetooth for industrial monitoring. The findings of this research indicate that Bluetooth is a viable choice for future industrial WSN deployments, providing reliable and robust coverage even in difficult industrial environments.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification Method and System of Abnormal Electricity Transaction Price Based on Alpha Convex Hull 基于Alpha凸包的异常电价识别方法及系统
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235017
Zhongkang Wei, Tianbo Zhu
{"title":"Identification Method and System of Abnormal Electricity Transaction Price Based on Alpha Convex Hull","authors":"Zhongkang Wei, Tianbo Zhu","doi":"10.1109/WCONF58270.2023.10235017","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235017","url":null,"abstract":"This article presents a method and system for identifying abnormal electricity trading prices based on alpha convex hull, which includes the following steps: inputting declared trading instructions into the trading system; The trading system extracts the price/electricity information from the declared trading instructions; Evaluate the risk level of transaction prices through the alpha convex hull algorithm behavior model library in the rule calculation engine; The risk level prompt information is sent to the database of the monitoring system and the user end of the trading system through the web end; Preprocess the price/electricity data and transfer it to the log system and Hadoop data warehouse; Regularly or quantitatively extract data from the database through specific commands, and update it to a behavioral model; end-of-job. The present invention solves the technical problems of high credit risk, high information authenticity risk, and low control power of transaction default risk in the trading process of existing power retail e-commerce platforms.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"243 2‐8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploration of Real-Time Intrusion Detection and Prevention Systems for Next Generation Networks 面向下一代网络的实时入侵检测与防御系统探索
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235147
M. A. Gunavathie, P. D. Sneha, K. Yuvarani, P. Swathyshree
{"title":"An Exploration of Real-Time Intrusion Detection and Prevention Systems for Next Generation Networks","authors":"M. A. Gunavathie, P. D. Sneha, K. Yuvarani, P. Swathyshree","doi":"10.1109/WCONF58270.2023.10235147","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235147","url":null,"abstract":"Network security is facing new difficulties as a result of the development of 5G and other networks as well as software-defined networking (SDN). As the volume and complexity of network traffic increase, so does the risk of cyber threats and attacks. Designing and implementing a real-time Intrusion Detection and Prevention System (IDPS) for 5G and beyond SDNs requires addressing several challenges. These challenges include the high data rate and volume of traffic, the distributed and dynamic nature of 5G and beyond networks, and the complexity of the SDN architecture. A global IDPS architecture should be created to address these issues, using methods based on machine learning to quickly identify and categorize intrusions. To allow actual time monitoring and avoidance, the IDPS should also work across all the SDN design layers and interact with the SDN router. The implementation of a real-time IDPS for 5G and beyond SDNs would enhance network security by enabling real-time detection and prevention of intrusions. This would reduce the risk of data breaches, network downtime, and other Cyber Security threats. Moreover, a real-time IDPS would allow network administrators to respond to intrusions quickly and effectively, minimizing the impact of cyber threats on network operations. The actual time detection and avoidance of intrusions system for 5G technology along with SDN is thoroughly reviewed in this paper.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132750424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of Accelerating Genetic Algorithms in System Engineering 加速遗传算法在系统工程中的应用
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235117
Shaochi Li, Naiqi Wu, Kaizhou Gao
{"title":"Applications of Accelerating Genetic Algorithms in System Engineering","authors":"Shaochi Li, Naiqi Wu, Kaizhou Gao","doi":"10.1109/WCONF58270.2023.10235117","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235117","url":null,"abstract":"Groundwater system engineering is a complex field that involves the management and optimization of water resources. The use of genetic algorithms has been proposed to improve the efficiency and accuracy of groundwater system engineering. Genetic algorithm is a computational tool simulating natural selection and evolution, which is used to find the best solution to complex problems. An accelerated genetic algorithm has been developed to accelerate the optimization process by reducing the required number of iterations. These algorithms use advanced technologies such as parallel processing, adaptive mutation rate, and elite selection strategies to quickly converge to the optimal solution. The application of accelerated genetic algorithm in groundwater system engineering has shown good results. They have been used to optimize oil well layout, pump scheduling, and pollutant remediation strategies. These optimization measures have significantly improved water resource management, including increased efficiency, reduced costs, and improved environmental effects. Overall, accelerated genetic algorithms are a powerful tool for improving groundwater system engineering. With the continuous development and improvement of these technologies, they will undoubtedly play an increasingly important role in managing our precious water resources. Based on FORTRAN90 computer language, this paper studies the application of accelerated genetic algorithm in engineering calculation of groundwater system..","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Smartphone Permissioned Security Breaches using Machine Learning Techniques 使用机器学习技术检测智能手机允许的安全漏洞
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10234970
Atul Kumar, Ishu Sharma
{"title":"Detection of Smartphone Permissioned Security Breaches using Machine Learning Techniques","authors":"Atul Kumar, Ishu Sharma","doi":"10.1109/WCONF58270.2023.10234970","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10234970","url":null,"abstract":"Attackers may target cell phones by taking advantage of the rights given to installed applications. Users frequently have to provide application permission when they download and install it on their smartphones. This experimental study concentrates on the identification of permissioned malware assaults in smartphone security breaches using machine learning approaches. In order to uncover security flaws in smartphones, the study compares the effectiveness of three widely used machine learning algorithms: Naive Bayes, K-nearest neighbor, and Decision Tree. Each method was trained and evaluated using the pre-processed data and then divided into training, and testing sets. The study evaluated trained and tested algorithm’s accuracy, precision, recall, and F1 score so that machine learning techniques can be deployed for detecting permissioned malware attack. The results prove that the technique Decision Tree Classifier is performing overall better in comparison with other chosen techniques for spotting security flaws in cellphones. Performance indicators for Naive Bayes were lower than those for the other two algorithms. This study offers insightful information about how well machine learning algorithms can execute early detection of permissioned malware attacks on smartphones, and it can be utilized as a model for creating secure smartphone defenses.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124219963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drug Quality Classification Using Sentiment Analysis of Drug Reviews 基于药品评论情感分析的药品质量分类
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235160
Devesh Parmar, Harsh Katariya, Arpit Dobariya, R. K. Gupta, S. Bharti
{"title":"Drug Quality Classification Using Sentiment Analysis of Drug Reviews","authors":"Devesh Parmar, Harsh Katariya, Arpit Dobariya, R. K. Gupta, S. Bharti","doi":"10.1109/WCONF58270.2023.10235160","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235160","url":null,"abstract":"Since the pandemic emerged, there has been a shortage in remote access to medical resources, a lack of medical experts and healthcare professionals, an absence of adequate instruments and medicines etc. As a result, many people have passed away. As there is absence of resources, people started off following medical recommendations without sufficient consultation, giving rise to their wellbeing to decline should have been. In recent years, machine learning has found several useful uses. The main objective for the study was to give a drug review prediction which would help to decrease the number of health care specialists and authority needed. In this investigation, we are developing a drug review system that analyses sick persons feedback to forecast patient’s comments using various vectorization algorithms, such as the Count Vectorizer, TF-IDF, Bag of Words, and handy analysis of characteristics that can aid in identifying the most effective course of treatment for a condition using several classification methods. The predicted results were assessed using the precision, accuracy, AUC, and F1 scores. The results demonstrate that the Random Forest Classifier surpasses every other model with an accuracy rate of 94%.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"57 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unstructured Big Data Quality Measurements and Failed Data Re-Processing Approach 非结构化大数据质量测量和失败数据再处理方法
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235088
Prasad Pande, Nikhil Rao
{"title":"Unstructured Big Data Quality Measurements and Failed Data Re-Processing Approach","authors":"Prasad Pande, Nikhil Rao","doi":"10.1109/WCONF58270.2023.10235088","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235088","url":null,"abstract":"This paper discusses role of data quality checks, in identifying message loss during large volume semi structured and unstructured data processing. We discuss data quality dimensions, applicable to semi structured and unstructured data in the form of email data. Email data confirms to RFC822 format and can have unstructured data like images, documents as attachments. Along with discussion of applicable data quality dimensions, we also discuss the formulae to evaluate data quality for each of these dimensions. The paper, focuses on big-data reprocessing, starting with need for data re-processing and identifying generic re-processing scenarios. This scenario identification step is important to ensure that the solution caters to all the re-processing requirements. It further discusses about types of data re-processing, core concepts on which re-processing solution is based and approach for handling different type of re-processing. The paper subsequently discusses principles of backlog processing for streaming data. The streaming data like email data, keeps flowing continuously at a very high rate. Any downtime in processing system, results in accumulation of data backlog. This accumulated data must be processed fully without creating a domino of backlogs. This document discusses statistical approach for forecasting time required to clear piled-up backlog of streaming data.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similar Images Finder Using Machine Learning 使用机器学习的类似图像查找器
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10235161
Sanidhya Nagar, Subhayan Das, Sangeeta
{"title":"Similar Images Finder Using Machine Learning","authors":"Sanidhya Nagar, Subhayan Das, Sangeeta","doi":"10.1109/WCONF58270.2023.10235161","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235161","url":null,"abstract":"Finding similar images using machine learning has become an important technique for image retrieval and organization in a numerous applications. This method involves training deep learning models to recognize visual patterns in images and extract features that can be used to identify similarities and differences between images. These features can then be used to create high-dimensional vectors that represent each image, which can be compared to find similar images. Various similarity metrics and clustering algorithms can be used to group similar images together, enabling efficient searching of large image datasets. This paper provides an outline of the methodology for finding similar images using machine learning, including data collection, preprocessing, deep learning model training, feature extraction, similarity calculation, and clustering. The paper also discusses the practical applications of this technique, such as image retrieval, image organization, and image analysis in fields such as medical research, computer vision, and machine learning. The proposed system can be a valuable tool for content creators, online platforms, and law enforcement agencies to ensure the protection of intellectual property rights and prevent unauthorized use of copyrighted images.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"60 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agricultural Management System Based on GPS and GIS 基于GPS和GIS的农业管理系统
2023 World Conference on Communication & Computing (WCONF) Pub Date : 2023-07-14 DOI: 10.1109/WCONF58270.2023.10234990
Yuping Hu
{"title":"Agricultural Management System Based on GPS and GIS","authors":"Yuping Hu","doi":"10.1109/WCONF58270.2023.10234990","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10234990","url":null,"abstract":"This article introduces an intelligent agricultural management system based on Global Positioning System (GPS) and Geographic Information System (GIS). This system uses GPS technology for geographic positioning and precise positioning of farmland, collects high-precision geographic information data, and combines GIS technology for analysis, processing, and visualization presentation. This system can intelligently manage farmland, including crop planting, fertilization, irrigation, harvesting, and other processes. At the same time, it can monitor and predict environmental factors such as soil moisture, temperature, and light, and make timely adjustments to ensure the healthy growth, high yield, and stability of crops. The advantages of this system include improving production efficiency, reducing losses, saving resource costs, and increasing profits. The experimental results indicate that the system can effectively improve agricultural production efficiency, promote sustainable development of agriculture, and is of great significance for achieving precision agriculture, agricultural intelligence, and other directions..","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信