物联网技术最新文献

筛选
英文 中文
Voting Classifier on Ensemble Algorithms for Breast Cancer Prediction 基于集成算法的投票分类器乳腺癌预测
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053498
Rajani Uppara, Surabhi Yadav, Dr.M. Kavitha
{"title":"Voting Classifier on Ensemble Algorithms for Breast Cancer Prediction","authors":"Rajani Uppara, Surabhi Yadav, Dr.M. Kavitha","doi":"10.1109/IDCIoT56793.2023.10053498","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053498","url":null,"abstract":"One of the leading causes of death in humans is cancer, with Breast cancer accounting for the majority of deaths among women. Both men and women are developing more Breast cancer cases every day. Breast cancer has become a huge health concerning issue. If Breast cancer is detected in early stages like stages 0 and 1, it can be cured without too much health risk which will reduce the death rate. Computer-Aided Detection or CAD systems are available to detect whether a woman or man has Breast cancer or not. The purpose of our research paper is to find a technique or algorithm that can help in the early detection of Breast cancer to save lives and reduce casualties. Here, different Machine Learning (ML) algorithms like decision tree, Support vector machine, ensemble algorithm of random forest with bagging and Ada boosting, and Voting Classifier are used. Breast cancer prediction with a Voting Classifier on ensemble algorithms is built. The performance of applied models is analyzed in terms of Accuracy, Precision, Recall, F1-score, and Support. The Voting Classifier gives the best results with 0.96 Accuracy because it uses the mean of ensemble algorithms to improve Accuracy value.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83042534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forest Fire Classification and Detection in Aerial Images using Inception-V3 and SSD Models 基于Inception-V3和SSD模型的航空图像森林火灾分类和检测
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053522
Sravya Sri Jandhyala, Ranga Rao Jalleda, Deepthi Meenakshi Ravuri
{"title":"Forest Fire Classification and Detection in Aerial Images using Inception-V3 and SSD Models","authors":"Sravya Sri Jandhyala, Ranga Rao Jalleda, Deepthi Meenakshi Ravuri","doi":"10.1109/IDCIoT56793.2023.10053522","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053522","url":null,"abstract":"Wildfires contribute to a lot of damage than what is visible. A significant population of a wide variety of species can easily disappear in a single wildfire if unnoticed. The human population including tribes, forest department staff, and rescuers too often lose their lives in wildfires. The unnoticed damage includes high carbon emission, heat waves, the amount of time that takes to rebuild such a green environment, etc. The impact of such wildfires can be highly reduced if detected at an earlier stage. This study has used a Convolutional Neural Network (CNN) based Inception-V3 model, which classifies a given aerial image based on the presence of fire or smoke, and a Single Shot Detector model that detects the fire or smoke areas in the image. These models were trained on aerial imagery using transfer learning which led to an overall accuracy of 88% for classification and 91% for detection. These models can be used to detect fires in live images captured by aerial vehicles helping the disaster management entities to react and respond immediately and accordingly.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83224934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Concept for Value Stream-Oriented Analyses of Event-based Data in Three Perspectives 基于事件的数据价值流分析的概念
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053516
N. Scheder, Tim Teriete, Stefanie Eisl, Mathias Nausch, Markus Böhm
{"title":"Concept for Value Stream-Oriented Analyses of Event-based Data in Three Perspectives","authors":"N. Scheder, Tim Teriete, Stefanie Eisl, Mathias Nausch, Markus Böhm","doi":"10.1109/IDCIoT56793.2023.10053516","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053516","url":null,"abstract":"Value stream mapping is an established method for analyzing and optimizing manufacturing systems. However, because of their high complexity and dynamic behavior, modern production systems of the industry 4.0 era are increasingly difficult to model in a static value stream map. A general approach to handle this challenge is to digitalize analysis, modeling, and visualization. This study shows how information gathered digitally during value stream analysis can be structured in a way to provide added value for users in visualization. For this purpose, three perspectives are derived and described in detail – ‘value stream map’, ‘order tracking’ and ‘resource monitoring’. These perspectives are also intended to cover sustainability KPIs and be real-time capable. The approach exploits standardized event data to ensure processing and development. It contributes to the utilization of data in the manufacturing context.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motion Estimating Optical Flow for Action Recognition : (FARNEBACK, HORN SCHUNCK, LUCAS KANADE AND LUCAS-KANADE DERIVATIVE OF GAUSSIAN) 用于动作识别的运动估计光流:(FARNEBACK, HORN SCHUNCK, LUCAS KANADE和LUCAS-KANADE高斯导数)
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053515
Rosepreet Kaur Bhogal, V. Devendran
{"title":"Motion Estimating Optical Flow for Action Recognition : (FARNEBACK, HORN SCHUNCK, LUCAS KANADE AND LUCAS-KANADE DERIVATIVE OF GAUSSIAN)","authors":"Rosepreet Kaur Bhogal, V. Devendran","doi":"10.1109/IDCIoT56793.2023.10053515","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053515","url":null,"abstract":"Motion estimating is one of the methods which determines the movement from one frame to another in the videos. For an application of action recognition, choosing the optical flow can be an essential feature for recognizing actions. The optical flow consists of the information of the moving subject and objects in the video frames. This paper analyzes four motion estimating optical flow methods (Farneback, Horn Schunck, Lucas Kanade, and Lucas-Kanade Derivative of Gaussian explored based on visualization and PSNR. The NTURGB+D dataset uses for the analysis of experimental results.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88293958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Energy Meter and Monitoring System using Internet of Things (IoT) 基于物联网的智能电表监控系统
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053541
M. Karpagam, S. S, S. S, Soundhariyasri S
{"title":"Smart Energy Meter and Monitoring System using Internet of Things (IoT)","authors":"M. Karpagam, S. S, S. S, Soundhariyasri S","doi":"10.1109/IDCIoT56793.2023.10053541","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053541","url":null,"abstract":"In recent times, the energy calibration methods are universally expanding with the goal of effectuating, reliably operating, and managing the utility system. The growing demand for power in the current environment has necessitated the mandatory installation of energy meters, as well as the development of new methods for calibrating meter readings and governing the effective use of energy resources. AMR (Automatic Meter Reading system) is one such modernization. This employs analogue or digital energy meters with the assistance of smart meters. Currently, energy scaling is done by hand, which is a timeconsuming process in the world of day-to-day networking demand and also requires skilled labour. The concept of AMR Systems is to overcome complexities in the rapidly growing field of energy management. This article proposes a smart energy meter based on IoT to detect the power theft. The proposed model consists of Arduino UNO, ESP8266, AC713 current sensors, and so on. The AC713 senses current usage with the help of the ESP32, which is then passed to the IoT platform. Though AMR is a very effective method, it costs the proxy of existing energy meters by SEM (Smart energy meters), which is highly inefficient. As a result, the proposed method focuses on detecting the power theft caused by public tampering. The proposed model is programmed by using a BLYNK software and simulated in PROTEUS software. The proposed system is then validated by using the simulated results.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72681109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain in Indian Agriculture to Disrupt the Food Supply Chain 印度农业区块链将颠覆食品供应链
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053406
G. Singh, Virat Singh Tomer, Alok Pandey, Rajendra Kumar Dwivedi
{"title":"Blockchain in Indian Agriculture to Disrupt the Food Supply Chain","authors":"G. Singh, Virat Singh Tomer, Alok Pandey, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053406","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053406","url":null,"abstract":"The Supply chain was always a complex task to manage the integrity, accountability, traceability, and quality of the products. The food supply chain is more important than any other supply chain. India is the second largest producer of fruits and vegetables in the world succeeding China. Although having a low level of processing, the quality of the final produced goods is not properly matched. Due to the lack of proper management in the food supply chain, many unauthorized small food organizations produce false products that are harmful to health. The modern supply chain is useful to prevent potential fraud a guarantees trade compliance. Blockchain technology solves the problem of complexity in the food supply chain. Blockchain uses a decentralized ledger to store the information, and this information cannot be changed or modified. Blockchain technology provides traceability, transparency, trust, and an immutable decentralized ledger to store data. In the existing blockchain based models, database consumption is very high. So, the proposed model introduces the concept of two parallel blockchain servers to optimize database usage.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75229219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Web Application for Accessing & Managing e - Resources 电子资源访问与管理Web应用程序的开发
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053413
Amol Gothi, Dhiraj Mandal, Kshitij Bangde, Surabhi Ghogare, P. Rajarapollu
{"title":"Development of Web Application for Accessing & Managing e - Resources","authors":"Amol Gothi, Dhiraj Mandal, Kshitij Bangde, Surabhi Ghogare, P. Rajarapollu","doi":"10.1109/IDCIoT56793.2023.10053413","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053413","url":null,"abstract":"Recently in the last few years there has been a drastic transition in the digital era. Education system is also not skipped through this phase of change. Due to the pandemic situation, the online education system was the only solution. To make online education more effective, quality proof, enjoyable and easier, an e library system has been developed. E-library is a platform where all the E-Books, Research papers, Articles, Journals, Study material are available for the students. After the proper authentication, students are able to login the system and have the benefit of all study material available from the institutional server. Three level securities are adopted to avoid unauthorized access to system and management of study data material. E-Library is playing a major role in enhancing students' interest in learning process, referring and reading the books. E-Library is also having an important role in self and sustainable growth of individual.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76013377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence in Children with Special Need Education 人工智能在特殊需要儿童教育中的应用
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053420
C. Neeharika, Y. Riyazuddin
{"title":"Artificial Intelligence in Children with Special Need Education","authors":"C. Neeharika, Y. Riyazuddin","doi":"10.1109/IDCIoT56793.2023.10053420","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053420","url":null,"abstract":"Students with special need education (SNE) can now benefit from new forms of interaction made possible by special educational needs. Recently artificial intelligent technologies have been among the most successful in recent decades (between 2001 and 2010). AI approaches are considered as a tool to improve the eminence of children with special needs. As a result, AI must be implemented. Content analysis was used to examine the replies. Research focused on whether the literature covered the topics of AI's influence on (a) SNE and (b) AI's ability to enable instructors to promote Special Needs Education. The study also attempted, through in-depth interviews, to provide a framework for a more inclusive future for special-needs education. As a result of the employment of AI, children with special needs and educational institutions alike have been affected. There has been a lot of attention paid to students with special needs in this paper, which looks at how AI affects their education. The proposed study has also implemented a data-driven approach to classify autism spectrum disorder (ASD) patients and typically developing (TD) participants data.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79384596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lifting Wavelet Transform based FBMC for Visible Light Communication System 基于提升小波变换的FBMC可见光通信系统
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053421
V. G. Krishnan, J. Deepa, G. Vishnupriya, B. S. Gowri, S. Raja
{"title":"Lifting Wavelet Transform based FBMC for Visible Light Communication System","authors":"V. G. Krishnan, J. Deepa, G. Vishnupriya, B. S. Gowri, S. Raja","doi":"10.1109/IDCIoT56793.2023.10053421","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053421","url":null,"abstract":"Lifting Wavelet Transform (LWT) and Pulse Amplitude Modulation (PAM)-based FBMC in VLC will lessen the difficulty of signal processing and address the test of VLC by simplifying the signal processing. Single and four-level LWT-based filter bank multi-carrier (FBMC) simulations using 4-PAM for VLC systems with various wavelet levels have been successfully simulated in this paper. LWT-FBMC is compared to FFT-FBMC using QPSK and 4-QAM and DCT-FBMC using 4-PAM in terms of BER and PAPR. For various channel conditions that are modelled, the BER of LWT-FBMC is lower than that of FFT-FBMC and DCT-FBMC. LWT-FBMC reaches 10-3 at SNR 17dB and 18dB, whereas FFT-FBMC reaches 10-3 at SNR 23dB for =0o and 10o BER. The BER of DCT-FBMC, on the other hand, can only be reduced to a minimum of 10-2 with an SNR of 40 dB. The BER and PAPR are reduced by four levels of LWT-FBMC. Four-level DWT-FBMC using db1 (7.7753 dB) and haar (7.7995 dB) has a lower PAPR than FFT-FBMC, which has a higher PAPR. This study goes into great detail about how the investigation was carried out.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80489515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart E-Locker System using IoT 使用物联网的智能电子储物柜系统
物联网技术 Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053507
Keerti R. Umadi, Adoni Aishwarya, Jyothi E Narendramath, Inchara S M, P. P. Priya Dharishini
{"title":"Smart E-Locker System using IoT","authors":"Keerti R. Umadi, Adoni Aishwarya, Jyothi E Narendramath, Inchara S M, P. P. Priya Dharishini","doi":"10.1109/IDCIoT56793.2023.10053507","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053507","url":null,"abstract":"In order to enhance daily life and actualize the Internet-of-Things (IoT) goal, several IoT gadgets have been created. IoT, which is based on the information-sharing capabilities of Radio Frequency Identification (RFID), is developing into one of the key technologies that is being used in a wide range of applications. Security and Privacy are necessities in today’s world. Security systems are being used exponentially more frequently in our daily lives and we all know that this is an information era where all transactions are through the exchange of data. The idea behind this smart e-locker system primarily came from the asset security system utilized in bank lockers. This smart e-locker system, triggers an alarm when a user attempts to enter a guarded area by scanning an unregistered token. This system includes unique and personalized tags that allow only the authorized user to enter the secured premises. The most unique feature is that the log of the number of people approach the locker or the secured area is stored in adafruit cloud. If an unauthorized user is trying to enter the secured area by scanning the unregistered token the buzzer will be activated automatically causing the guards to be notified and an alert is send to person in-charge through e-mail. This paper demonstrates how RFID technology improves security and convenience, which will be useful in the future.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85790164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信