This paper further enhances the techniques and chronological methods in order to perform the corresponding manipulation and further prediction analysis. We have acquired a real time dataset based on the twitter user...
详细信息
ISBN:
(数字)9781728106663
ISBN:
(纸本)9781728106670
This paper further enhances the techniques and chronological methods in order to perform the corresponding manipulation and further prediction analysis. We have acquired a real time dataset based on the twitter user's comments sections. The uniqueness of the dataset is that we have extracted only the particular comments which syntheses a particular word based on the product. Then further repetitive extraction is made in order to complete the dataset. Our dataset has three columns based on the ideology that the particular user or our focused subject has enhanced any detail about the product that we are observing. In this precise dataset we have taken the subject about the products usage by the users that have been manufactured by the companies Google and Apple. Both technology giants have well versed their technology reign in this era and their further focused in their upcoming cyber projects and their products will be more advanced in future. As they are in involved in further optimization in their devices and increasing their specifications. It would be complex task to accomplish their project without the feedback, pros and cons of their predecessor projects. They can extract such features from twitter api dataset and they could further enhance their product. They could analyze the drawback, whether the product has reached the market and came out with success all type of this information can be extracted from social media instead of conducting a survey. Such process would be more hectic classification and we cannot predict any accurate results. So we proceed with the social media Data mining Process.
Android malwares are proliferating in the public spaces like never before. The urge of the adversaries to collect user data through various means to establish a pattern or behaviour is ever growing. The malwares have ...
详细信息
ISBN:
(纸本)9781728100012
Android malwares are proliferating in the public spaces like never before. The urge of the adversaries to collect user data through various means to establish a pattern or behaviour is ever growing. The malwares have become sophisticated to label them as good or bad. In this paper, we try to establish a good set of features from Android applications to label them as benign or malware. We have developed a framework to automatically extract features via stationary, static and dynamic analysis of the Android applications. Pre-static analysis include application meta-data from playstore and Android manifest from application. Static analysis of the application comprises flow-droid's source-sink identification, api to permission mapping and n-gram statistical analysis. Dynamic analysis of the application is performed using Google's droidbox and monitoring the system calls. The features are exported in a general format and can act a input to a learning based model for application classification.
With the amazing success of PokemonGo, pervasive games have definitely caught the attention of the entire world. Their game experience is characterized by the fusion of real and virtual elements. In order to be able t...
详细信息
ISBN:
(数字)9781728138930
ISBN:
(纸本)9781728138947
With the amazing success of PokemonGo, pervasive games have definitely caught the attention of the entire world. Their game experience is characterized by the fusion of real and virtual elements. In order to be able to extend the virtual world into the real one, such games have to access the mobile devices sensors like GPS and camera. For this reason, they are implemented as native or hybrid mobile applications. Contrary to this trend, in this paper we present Shoot Them All, a pervasive game implemented as a web application. In Shoot Them All, players have to hit the opponents, trying, at the same time, not to get hit. The battlefield is the real world, while the guns are virtual, as an extension of players' mobile devices. We were able to successfully developed such a game thanks to the availability of Javascript APIs that allow to access and manage device sensors. The success of this case study highlight how these technologies are mature enough, opening the door to web pervasive games.
This paper introduces a preliminary research work ofsynchronized collaborative design based onheterogeneous CAD systems. By analyzing several typicalCAD systems, we set up a number of neutral commandscorresponding to ...
详细信息
ISBN:
(纸本)0780379411
This paper introduces a preliminary research work ofsynchronized collaborative design based onheterogeneous CAD systems. By analyzing several typicalCAD systems, we set up a number of neutral commandscorresponding to the basic modeling operations of CADsystems. Based on the neutral commands, communicationbetween heterogeneous CAD systems is ***, synchronized collaborative design isrealized by real-time capturing and transferring ofmodeling operations between distributed heterogeneousCAD systems.A protoype of synchronized collaborativedesign is developed based on two common CAD systemsMDT and SOLIDWORKS with their APIs and VC++. Thepreliminary test results show the proposed approachpromising.
As technology grows, more and more devices are connected. Most of these devices are called the Internet of Things (IoT). IoT is expanding in various domains, from general health care and massive industrial operation d...
详细信息
As technology grows, more and more devices are connected. Most of these devices are called the Internet of Things (IoT). IoT is expanding in various domains, from general health care and massive industrial operation devices such as cars to intelligent devices and mobility for environment monitoring and home automation such as intelligent cameras, smart doorbells, and vacuums. Furthermore, in public and private sectors, to become a well-known object of everyday life. Nowadays, there are 6 billion devices on the Internet. With this spreading, IoT's cybersecurity becomes a critical aspect protecting it and its sensitive data from different attacks. This paper will present a comprehensive view of the IoT application layer security concerns and attacks, focusing on one of the critical attacks conducted on this layer, vulnerabilities in the applicationprogramming interfaces (APIs) in IoT devices, APIs in IoT are the communication points between IoT devices and the internet. Moreover, this paper will cover how APIs communicate through IoT devices, and the attacks that target the APIs.
To assist the disabled, a system was developed and designed to provide passenger transport services for disabled persons in wheelchairs. Machine-learning image-recognition technology was applied to provide accessible ...
详细信息
ISBN:
(纸本)9781728125176
To assist the disabled, a system was developed and designed to provide passenger transport services for disabled persons in wheelchairs. Machine-learning image-recognition technology was applied to provide accessible bus rides for the disabled. Based on the video footage at the bus stop, this system can judge whether there are wheelchair riders in the waiting area. YOLOv3, a real-time image-recognition model, was used for object recognition and notification. By combining LINE with the Flask Web application framework, it helps the disabled transmit messages and actively notifies bus drivers. The API server was established using the Flask framework. When the system at the bus stop detects the disabled, the images of the disabled waiting for the bus are transmitted to the server, and the images and related messages are transmitted in real time to the users through the LINE Message API. Passengers can also use the LINE chatbot to enter keywords to confirm the real-time location of the bus. The dynamic bus information comes from the Open Data of the Bureau of Transportation. The LINE BOT API program was developed using the PyCharm tool and then transmitted to the Heroku cloud platform for deployment. The LINE BOT API provides real-time wheelchair image recognition, and receives notifications and bus information queries through the LINE chatbot. The main contributions of this study are the use of artificial intelligence (AI) technology to provide solutions to facilitate bus rides for the disabled and to improve the quality of barrier-free transport services in modern society.
Parents have told you not to play with your food, but what's appropriate at the dinner table isn't necessarily applicable elsewhere. Modern culture thrives on mixing things together to create new flavours. It ...
详细信息
Parents have told you not to play with your food, but what's appropriate at the dinner table isn't necessarily applicable elsewhere. Modern culture thrives on mixing things together to create new flavours. It happened with music, and then with video, and now we're seeing it with online services. 'Mash-ups' are the latest buzzword in software development, and they are predicated on on mixing together Internet experiences that would previously have been consumed separately. Mash-ups are based on one of the fundamental tenets of Web 2.0 technology: that data contributed by a Web site's users should be easy for those users to consume in different forms. This philosophy drove sites such as Google, Flickr and Amazon to provide open applicationprogramming interfaces (APIs). "Mash-ups are about letting the user do the integration and filter their data all on their own. "Asynchronous Java and XML (AJAX) is one popular technology, enabling Web 2.0 users to manipulate online information without having to make multiple time-consuming queries to the server, as traditional HTML-based forms do. (3 pages).
暂无评论