scholarly journals Research and Application of Film and Television Literature Recommendation Based on Secure Internet of Things and Machine Learning

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Jieqiong Zhou ◽  
Zhenhua Wei ◽  
Bin Peng ◽  
Fangchun Chi

Film and television literature recommendation is an AI algorithm that recommends related content according to user preferences and records. The wide application in various APPs and websites provides users with great convenience. This article aims to study the Internet of Things and machine learning technology, combining deep learning, reinforcement learning, and recommendation algorithms, to achieve accurate recommendation of film and television literature. This paper proposes to use the ConvMF-KNN recommendation model to verify and analyze the four models of PMF, ConvM, ConvMF-word2vec, and ConvMF-KNN, respectively, on public datasets. Using the path information between vertices in bipartite graph and considering the degree of vertices, the similarity between items is calculated, and the neighbor item set of items is obtained. The experimental results show that the ConvMF-KNN model combined with the KNN idea effectively improves the recommendation accuracy. Compared with the accuracy of the PMF model on the MovieLens 100 k, MovieLens 1 M, and AIV datasets, the accuracy of the ConvMF model on the above three datasets is 5.26%, 6.31%, and 26.71%, respectively, an increase of 2.26%, 1.22%, and 7.96%. This model is of great significance.

Proceedings ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 39
Author(s):  
Manuel López-Vizcaíno ◽  
Laura Vigoya ◽  
Fidel Cacheda ◽  
Francisco J. Novoa

Communication network data has been growing in the last decades and with the generalisation of the Internet of Things (IoT) its growth has increased. The number of attacks to this kind of infrastructures have also increased due to the relevance they are gaining. As a result, it is vital to guarantee an adequate level of security and to detect threats as soon as possible. Classical methods emphasise in detection but not taking into account the number of records needed to successfully identify an attack. To achieve this, time-aware techniques both for detection and measure may be used. In this work, well-known machine learning methods will be explored to detect attacks based on public datasets. In order to obtain the performance, classic metrics will be used but also the number of elements processed will be taken into account in order to determine a time-aware performance of the method.


Telecom IT ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 50-55
Author(s):  
D. Saharov ◽  
D. Kozlov

The article deals with the СoAP Protocol that regulates the transmission and reception of information traf-fic by terminal devices in IoT networks. The article describes a model for detecting abnormal traffic in 5G/IoT networks using machine learning algorithms, as well as the main methods for solving this prob-lem. The relevance of the article is due to the wide spread of the Internet of things and the upcoming update of mobile networks to the 5g generation.


Author(s):  
Anastasiia Ivanitska ◽  
Dmytro Ivanov ◽  
Ludmila Zubik

The analysis of the available methods and models of formation of recommendations for the potential buyer in network information systems for the purpose of development of effective modules of selection of advertising is executed. The effectiveness of the use of machine learning technologies for the analysis of user preferences based on the processing of data on purchases made by users with a similar profile is substantiated. A model of recommendation formation based on machine learning technology is proposed, its work on test data sets is tested and the adequacy of the RMSE model is assessed. Keywords: behavior prediction; advertising based on similarity; collaborative filtering; matrix factorization; big data; machine learning


2021 ◽  
Vol 19 (3) ◽  
pp. 163
Author(s):  
Dušan Bogićević

Edge data processing represents the new evolution of the Internet and Cloud computing. Its application to the Internet of Things (IoT) is a step towards faster processing of information from sensors for better performance. In automated systems, we have a large number of sensors, whose information needs to be processed in the shortest possible time and acted upon. The paper describes the possibility of applying Artificial Intelligence on Edge devices using the example of finding a parking space for a vehicle, and directing it based on the segment the vehicle belongs to. Algorithm of Machine Learning is used for vehicle classification, which is based on vehicle dimensions.


Author(s):  
S. Kavitha ◽  
J. V. Anchitaalagammai ◽  
S. Nirmala ◽  
S. Murali

The chapter summarizes the concepts and challenges of DevOps in IoT, DevSecOps in IoT, integrating security into IoT, machine learning and AI in IoT of software engineering practices. DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of DevOps is the automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevSecOps is a practice of integrating security into every aspect of an application lifecycle from design to development.


Sign in / Sign up

Export Citation Format

Share Document