{"title":"Sentiment Analysis with Various Deep Learning Models on Movie Reviews","authors":"M. S. Başarslan, F. Kayaalp","doi":"10.1109/ICAIoT57170.2022.10121745","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121745","url":null,"abstract":"Social media have led to the development of artificial intelligence tasks such as sentiment analysis to see whether people’s posts have a positive or negative effect on other people. Ideas that affect society directly or indirectly about various domains, such as a movie or a meal, are very important for many business operations. This paper presents a sentiment analysis study which was carried out with 7 models based on various methods of deep learning algorithms on IMDB dataset. The best result was obtained with the model consisting of 2 Bi-LSTM and 2 dropout layers with 80%–20% train-test separation and an accuracy value of 88.21%.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116997318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting Energy Consumption Using Deep Learning in Smart Cities","authors":"Selahattin Serdar Helli, Senem Tanberk, O. Demir","doi":"10.1109/ICAIoT57170.2022.10121846","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121846","url":null,"abstract":"Global energy demand is increasing continuously due to growth in the world population and industrial developments. In a parallel dimension, the problem of decreasing CO2 emissions in smart cities is becoming a priority. Forecasting energy consumption is essential for implementing a decarbonization plan in a smart city. The energy consumption forecasting problem has some challenges because of lacking appropriate data, including energy consumption patterns in the energy sector. In such a context, in this study, we focus on short-term time series forecasting for energy consumption tasks with comprehensive data. We employed LSTM, Transformer, XGBoost, and hybrid models to predict energy consumption via time series. The models were tested on the JERICHO-E-usage Germany dataset for Berlin, Düsseldorf, and the whole of Germany. We executed an energy consumption forecasting pipeline in our experiments to summarize Information and Communication Technology and Lighting energy types. Finally, we presented a comparative analysis between state-of-art deep learning and machine learning models (e.g., LSTM, Transformer, XGBoost), and a hybrid model. The proposed energy consumption forecasting pipeline can be applied to various countries and cities based on geographical distributions.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116364362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Frameworks Human-Type Communication Over Wireless Sensor Network","authors":"S. Mohammed, M. Ilyas","doi":"10.1109/ICAIoT57170.2022.10121889","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121889","url":null,"abstract":"This study intends to construct sophisticated Wireless Sensor Network topologies for real-time group collaboration. WSNs use dispersed sensors to safeguard data privacy and convey data for analysis. Medical services, postal delivery, energy companies, and industries use WSNs to monitor machines and discover faults. Weakly Connected Networks (WSNs) collect optimal application estimates and transfer them to a door so clients can understand and execute them. WSNs are crucial to human communication because they can be programmed to spot pauses and persistent attacks in ViWi: A framework for deep learning data sets for vision-assisted wireless communications. WSN direction standards describe paths between starting and ending nodes. How can these guiding principles divide the organization into more manageable segments and stimulate contact between them and their neighbors before sending information further afield? The testing industry continues to develop new libraries, methodologies, test findings, and customization possibilities. Python reduces grammatical complexity, increases efficiency compared to prearranging languages, and ensures memory safety. This cutting-edge research recognizes that memory health is an issue for modern human communication systems and has begun porting portions of their convention disentangling logic to achieve a 98.74% accuracy rate for distinguishing all interruptions within the WSN that use a parser age structure to achieve safe convention parsing.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Triple Band Notch Microstrip Antenna for Wireless Communication","authors":"Adil S. Abduljabbar, R. H. Thaher","doi":"10.1109/ICAIoT57170.2022.10121864","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121864","url":null,"abstract":"Band pass antenna design, modeling, and manufacturing are all presented in this work. A triple-notched band UWB is created using slots that are about a fourth of the length of the guided wavelength at the notch frequency and by inserting an inverted U-shaped stub at the top of the patch and cutting a slot at the bottom of the radiating patch, the band rejection characteristics for the C band are attained between (4.04–4.7) GHz and (5.6–7.3) GHz, respectively. Further, from (8.5–9.2) GHz is acquired for the X band. By adjusting antenna characteristics, notch bands can be made. Epoxy was used to model and build the design, and it had a 1.6 mm thickness and a ε_r4.3 dielectric constant. Any RF/microwave communication system that has to protect many bands from interference can benefit from this kind of filter. This method also allows for cost and overall physical reductions while keeping outstanding performance. Finally, the proposed antenna with dimensions of (30 × 40 × 1.6) 〖mm〗 ^2 is created and manufactured There is a reasonable agreement between the simulated and produced measurements.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NWDAF UDI (Use-case Development Interface) for End-to-end AI Enabled 5G and Beyond Networks","authors":"Hale Donertasli, Madhukiran Medithe","doi":"10.1109/ICAIoT57170.2022.10121746","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121746","url":null,"abstract":"The Network Data Analyses Function (NWDAF) is a 3GPP standard that enables the use of Machine Learning (ML) models to automate the heavy data analytics in 5G. NWDAF generates and analyzes 5G network data, and network entities behave accordingly depending on the gleaned knowledge. There is a potential for a 5G network to be managed via closed loop end-to-end NWDAF use-cases. Despite this, there hasn’t been much research done in the subject recently. This paper explains NWDAF Use-case Development Interface (UDI) which defines the protocols between producers and consumers for them to interact for data exchange and then later on to track the actions being decided to be taken and their evaluation feedback based on the results of the 5G network. Furthermore, we describe unresolved issues and thoroughly review relevant work, and then define NWDAF UDI which provides SBA based HTTP APIs for NWDAF use-case developers to create closed loop 5G network management involving NFs, AFs, OAM, slice manager and RAN, TN, CN domain controllers.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129268914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICAIoT 2022 Conference Organization Committee","authors":"","doi":"10.1109/icaiot57170.2022.10121897","DOIUrl":"https://doi.org/10.1109/icaiot57170.2022.10121897","url":null,"abstract":"","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122470500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation and Verification of NLP Datasets for the Albanian Language","authors":"Labehat Kryeziu, Visar Shehu, Agron Chaushi","doi":"10.1109/ICAIoT57170.2022.10121823","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121823","url":null,"abstract":"Computational Linguistics has seen tremendous growth and provided users with high end applications in the form of automatic translation tools, speech recognition, speech synthesis etc. However, such advancements are lacking for low resource languages. Our research aims to tackle one of these challenges, specifically advancing Computational Linguistics and Natural Language Processing for the Albanian Language. To develop accurate NLP tools, one must have a consistent and clean dataset for that language. In this paper we evaluate two well-known text corpora: OSCAR and CCAligned. The results are compared with a dataset that we have collected and curated, which we will refer in this paper as alb_dataset. Various statistical means have been used to compare and evaluate the datasets. Conclusions of this paper can be used by NLP researchers of the Albanian language before they use one of the text corpora mentioned above.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-Based Architecture for DDoS Detection in VANETs System","authors":"Naam Alkadiri, M. Ilyas","doi":"10.1109/ICAIoT57170.2022.10121900","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121900","url":null,"abstract":"With the fast and huge vehicular communication systems currently being developed, there is a clear and urgent need for advanced security. To determine whether a vehicle has been attacked, we developed a tool called the misbehavior detection system (MDS), which is intended to help the vehicle take action and minimize any potential harm from attackers. One of the most dangerous forms of attack that threaten vehicular communication systems are distributed denial of service (DDoS) attacks, and increasing the security of VANETs against such attacks is a topic that a large number of researchers are now considering, were to provide highly effective security capabilities, machine learning (ML) techniques were applied. NSL-KDD or KDD-CUP99 datasets form the basis for the greater part of the current research. Attacks on these datasets were outdated. Therefore, we used a new dataset generated by OMNeT++, Veins, and Sumo. Two different types of attacks were conducted during this simulation, and the XGBoost classifier was used to evaluate and predict MDS systems. The median F1-score for this XGBoost classifier was 99%, which represented a clear advantage over another ML method, where we used the Synthetic Minority Oversampling Technique (SMOTE) to class balance the datasets.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Intelligent IoT Devices at the Edge","authors":"Kevin Afachao, A. Abu-Mahfouz","doi":"10.1109/ICAIoT57170.2022.10121824","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121824","url":null,"abstract":"The Internet of Things is fast expanding with paradigms to describe its new frontiers. A more closely tied term to the Internet of Things is Edge Computing, which describes empowering devices at the edge with intelligence. One characteristic of these edge devices is the improved latency provided against Cloud computing. The network edge is an under-utilized area and by merging intelligence with edge computing devices, we can effectively exploit it with novel approaches. This paper seeks to bring to light several “Internet of Things” devices at the edge and their capability in bringing intelligence to the network edge. A novel approach is introduced by comparing devices concerning the processing capability, memory capacity and applications. It is then clear, that there are many devices today on par with smartphones equally capable of deploying intelligence at the edge.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICAIoT 2022 Cover Page","authors":"","doi":"10.1109/icaiot57170.2022.10121871","DOIUrl":"https://doi.org/10.1109/icaiot57170.2022.10121871","url":null,"abstract":"","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}