2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

筛选
英文 中文
Data Mining based Handling Missing Data 基于缺失数据处理的数据挖掘
A. Dubey, A. Rasool
{"title":"Data Mining based Handling Missing Data","authors":"A. Dubey, A. Rasool","doi":"10.1109/I-SMAC47947.2019.9032631","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032631","url":null,"abstract":"Today, a huge amount of data are generated in many applications than ever before. However, most of the application's data are affected by the issue of missing values. This issue has gained significant attention throughout the statistical research. Several obvious examples involve repositories related to the management of equipment, business applications, and surveys. One of the usual ways to handle this issue is to fill the value using imputation. Several imputation techniques have been proposed until now to handle the missing data. With the rapidly increasing size of the dataset, a modern imputation approach algorithm is required. In this paper, we provide an extensive overview of the current imputation methods, with a special focus on algorithms utilizing the local or global correlation available within the dataset. Furthermore, the paper shows how the prediction made can be validated and some possible future directions. This paper is expected to give the researchers a good grasp of the current trends in this domain and to enable them to create a more robust and efficient algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multidisciplinary Approach of Artificial Intelligence over Medical Imaging: A Review, Challenges, Recent Opportunities for Research 人工智能在医学影像上的多学科方法:综述,挑战,最近的研究机会
A. Tiwari, Manisha L Chaudhari, Ankita Rai
{"title":"Multidisciplinary Approach of Artificial Intelligence over Medical Imaging: A Review, Challenges, Recent Opportunities for Research","authors":"A. Tiwari, Manisha L Chaudhari, Ankita Rai","doi":"10.1109/I-SMAC47947.2019.9032566","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032566","url":null,"abstract":"Multidisciplinary approach of artificial intelligence is revolutionizing the traditional technologies used in medical image computing, radiology imaging, medical diagnoses and features based disease identification [1], [2]. In this paper, overview of artificial intelligence and its application over medical images, recent challenges, deeper technological background regarding betterment/innovation healthcare, real life clinical application with parameters of diagnosis, will improve patient health and feature based disease identification. It provides methodologies in the field of medical imaging by developing self driven and intelligent algorithm that manages and extracts meaningful information out of raw data present in the images. It helps in early diagnosis and treatment of the diseases. This paper focuses on various aspects and issues on the growing role of medical image, fundamental technical advantage of AI over traditional patterns for the betterment of human lives. From this research work, reader understands deeper technological aspects for smart algorithms regarding diseases and patient care.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Based Handy Fuel Flow Measurement 基于物联网的便捷燃油流量测量
Pavan Manjunath, Pritam Gajkumar
{"title":"IoT Based Handy Fuel Flow Measurement","authors":"Pavan Manjunath, Pritam Gajkumar","doi":"10.1109/I-SMAC47947.2019.9032467","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032467","url":null,"abstract":"The adoption of the newer technologies for measuring the fuel flow into the vehicle fuel tank is a very feasible option, and gives accurate values without tampering the value count of the fuel flow's digital data values. With the help of digital measurement sensors the proposed Internet of Things (IoT) based fuel flow monitoring system helps to obtain a precise level of fuel count. This research paper provides an overview of the IOT based fuel flow digital measurement sensors, by sending the real-time inputs to user mobile, about how much petrol or diesel flow is pumped into vehicle tank. Therefore, it is not necessary that user should depend on the petrol pump digital machine display unit, for gauging the fuel flow into the fuel tank of the vehicle. These devices will always act as a lightweight portable device and the user can carry these lightweight portable devices anywhere and at any time.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ECG Electrodes for Smart ECG Monitoring for biomedical applications 用于生物医学应用的智能心电监测的ECG电极
Malti Bansal, Bani Gandhi
{"title":"ECG Electrodes for Smart ECG Monitoring for biomedical applications","authors":"Malti Bansal, Bani Gandhi","doi":"10.1109/I-SMAC47947.2019.9032663","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032663","url":null,"abstract":"There has been an expeditious rise in various complicated and vulnerable diseases in the world today. The most critical set of diseases are Cardiovascular Diseases (CVDs). CVDs are affecting a lot of population present across the globe. As these diseases are unpredictable in nature, medical facilities and diagnosis should be made more prompt and effective. As the world population is rapidly increasing, there is a massive burden on the healthcare industry. The healthcare systems should be portable, more connected and most importantly reliable. This can only be accomplished with the help of various technologies. First and foremost, are the sensors used to measure the Electrocardiogram (ECG) for various CVDs. Decades ago, Ag/AgCl gel based electrodes were used to measure the ECG. However, due to their various disadvantages, the medical fraternity moved on to using dry electrodes. Various dry electrodes were developed and used for this purpose. Further, in the category of dry electrodes, Carbon Nanotubes (CNTs) based ECG electrodes have shown great potential in this domain. Due to the various advantages of CNTs like flexibility, conductivity, and lighter weight, it can be used to fabricate electrodes or can be embedded into the textiles. Thus, people suffering from CVDs can incorporate these electrodes / sensors in their daily lives for early detection of the disease, and the person's life can be saved. As CNTs are smart materials, easily and readily available, and most importantly available in low costs, they can be used for fabricating smart devices. These characteristics of CNTs make them a perfect candidate for biomedical applications. This paper reviews various works related to fabrication of multiwall carbon nanotube (MWCNT) based electrodes, for ECG monitoring.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN based speaker recognition in language and text-independent small scale system 基于CNN的语言文本独立小型系统说话人识别
Rohan Jagiasi, Shubham Ghosalkar, Punit Kulal, A. Bharambe
{"title":"CNN based speaker recognition in language and text-independent small scale system","authors":"Rohan Jagiasi, Shubham Ghosalkar, Punit Kulal, A. Bharambe","doi":"10.1109/I-SMAC47947.2019.9032667","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032667","url":null,"abstract":"Speaker Recognition is the ability of the system to recognize the speaker from the set of speaker samples available in the system. It is of 2 types, one uses a keyword, called text-dependent systems, and another one can recognize the voice in any language/text, also called as text-independent speaker recognition. In this paper, a text-independent, language-independent speaker recognition system is implemented using dense & convolutional neural networks. Speaker recognition has found several applications in upcoming electronic products like personal/home assistants, telephone banking and biometric identification. In this paper, we explore a system that uses MFCC along with DNN and CNN as the model for building a speaker recognition system.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"112 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Android Application Development: A Brief Overview of Android Platforms and Evolution of Security Systems Android应用开发:Android平台和安全系统的发展概述
Anirban Sarkar, Ayush Goyal, David Hicks, Debadrita Sarkar, Saikat Hazra
{"title":"Android Application Development: A Brief Overview of Android Platforms and Evolution of Security Systems","authors":"Anirban Sarkar, Ayush Goyal, David Hicks, Debadrita Sarkar, Saikat Hazra","doi":"10.1109/I-SMAC47947.2019.9032440","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032440","url":null,"abstract":"With the advent of new mobile technologies, the mobile application industry is advancing rapidly. Consisting of several operating systems like symbian OS, iOS, blackberry, etc., Android OS is recognized as the most widely used, popular and user-friendly mobile platform. This open-source linux kernel-based operating system offers high flexibility due to its customization properties making it a dominant mobile operating system. Android applications are programmed in java language. Google android SDK delivers a special software stack that provides developers an easy platform to develop android applications. Moreover, developers can make use of existing java IDEs which provides flexibility to the developers. Java libraries are predominant in the process of third-party application development. Cross-platform approaches make sure that developers do not have to develop platform-dependent applications. With the help of these approaches, an application can be deployed to several platforms without the need for changes in coding. However, android is more prone to security vulnerabilities which the majority of the users do not take into account. Any android developer can upload their application on the android market which can cause a security threat to any android device. These applications do not have to go through rigorous security checks. In this paper, a layered approach for android application development along with various cross-platform approaches is discussed. Moreover, a brief introduction to new android platforms including security framework as well as security systems is discussed.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Investigation and classification of cyber-crimes through IDS and SVM algorithm 基于IDS和SVM算法的网络犯罪调查与分类
Hamid Zolfi, H. Ghorbani, M. Ahmadzadegan
{"title":"Investigation and classification of cyber-crimes through IDS and SVM algorithm","authors":"Hamid Zolfi, H. Ghorbani, M. Ahmadzadegan","doi":"10.1109/I-SMAC47947.2019.9032536","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032536","url":null,"abstract":"The evolution of information technology and the development of usage of the high speed internet has brought about changes in the human daily activities. And also access to a large amount of information available through Internet and network platform have led to an increase in the knowledge level of individuals. But along with these changes that have changed the quality of life, and despite all the features and capabilities of the Internet, the criminals have been able to enter the organizational computer systems, and a new type of crime known as computer crime has been emerged which has doubled the importance of tracking, detecting and dealing with these crimes. The spread of computer crime in different countries has led to the adoption of appropriate solutions through the development of relevant laws and raising public awareness and also detection and counteraction of computer crimes requires high level of knowledge, skills and technology. In this way, today intrusion detection and prevention systems along with firewalls are the main mechanisms for achieving the network security. purpose of this study is to identify meaningful patterns for categorizing computer attacks as a solution for Detecting as much as possible malicious attacks and anticipating future criminal activities by using the intrusion detection systems and focus on evidence gathering about suspicious activities and therefore increasing network security. For this purpose, the present study investigates computer crimes that occurred through the traffic network of a petrochemical subsidiary company in a given period of time through the attacks modeling using the SVM algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125603741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Detailed Motor Selection for Electric Vehicle Traction System 电动汽车牵引系统电机选型详细分析
Mayuri S. Patil, S. Dhamal
{"title":"A Detailed Motor Selection for Electric Vehicle Traction System","authors":"Mayuri S. Patil, S. Dhamal","doi":"10.1109/I-SMAC47947.2019.9032616","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032616","url":null,"abstract":"Electric vehicle is the upcoming buzz word in the coming decade. The main component driving the vehicle is motor and its driving mechanism, that efficiently utilises the power stored in the batteries. Industrially, variety of electric motors is available to be used in traction system. Along with selection of motor, proper choice of motor drive mechanism is essential for design and operation of electric vehicle. In this paper, a detailed review of various electric motors available will be judged for its suitability for vehicle applications. Also, it is essential for the traction system to access various drive mechanism for efficient operation of electric vehicle.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Enhancement Scheme in Mobile Wireless Sensor Networks Using RAPD Approach 基于RAPD方法的移动无线传感器网络安全增强方案
Abhijit S. Bodhe, Jagdisha N.
{"title":"Security Enhancement Scheme in Mobile Wireless Sensor Networks Using RAPD Approach","authors":"Abhijit S. Bodhe, Jagdisha N.","doi":"10.1109/I-SMAC47947.2019.9032647","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032647","url":null,"abstract":"Now a day's social media is trending towards wireless technology for a wire-free and faster communication, especially mobile devices are interconnected together to create a complete network in an organization or even in the home, where the detection and identification of fraud devices play an important role. These devices can be a potential threat to the entire network. The proposed method focuses on identification and eradication of fake/rouge access points which is installed by mistake or intentionally by end user, using beacon frame this can possible to identify and remove such rouge devices from the network in faster and cheaper rate, without any additional hardware's, The paper will surly an extension for security enhancements with RAPD algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on IoT Standards and Suggesting a New Method to Enhance Data Security 物联网标准综述及提高数据安全的新方法
H. Ghorbani, M. Mohammadzadeh
{"title":"Review on IoT Standards and Suggesting a New Method to Enhance Data Security","authors":"H. Ghorbani, M. Mohammadzadeh","doi":"10.1109/I-SMAC47947.2019.9032571","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032571","url":null,"abstract":"IoT is a new phenomenon that quickly spread and has penetrated unequivocally in all areas, including economics, education, industry, entertainment, and is a very serious competitor with high abilities for other technologies. One of the pillars of the IoT is information and data in its network which includes a large variety. This diversity has been added to the importance of data protection. In the digital world, all the work is done on the basis of data and their value and these data, which play a fundamental role in the success or failure of the work. The determination of data value and data security are very important. In most articles and works in this field, all attention has been given to one dimension of security, and security has never been seen from the general viewpoint. While we need to provide security at different levels for security purposes. In this article, we refer to a method that can be used to create a ring of protection for data. This guard ring must meet the minimum requirements, which includes the five items that we refer to. On the other hand, with increased security for each item, our data security will also increase. By doing this, we can always create a minimum level of security for data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信