Purpose-Natural languages have a fundamental quality of suppleness that makes it possible to present a single idea in plenty of different ways.This feature is often exploited in the academic world,leading to the theft...Purpose-Natural languages have a fundamental quality of suppleness that makes it possible to present a single idea in plenty of different ways.This feature is often exploited in the academic world,leading to the theft of work referred to as plagiarism.Many approaches have been put forward to detect such cases based on various text features and grammatical structures of languages.However,there is a huge scope of improvement for detecting intelligent plagiarism.Design/methodology/approach-To realize this,the paper introduces a hybrid model to detect intelligent plagiarism by breaking the entire process into three stages:(1)clustering,(2)vector formulation in each cluster based on semantic roles,normalization and similarity index calculation and(3)Summary generation using encoder-decoder.An effective weighing scheme has been introduced to select terms used to build vectors based on K-means,which is calculated on the synonym set for the said term.If the value calculated in the last stage lies above a predefined threshold,only then the next semantic argument is analyzed.When the similarity score for two documents is beyond the threshold,a short summary for plagiarized documents is created.Findings-Experimental results show that this method is able to detect connotation and concealment used in idea plagiarism besides detecting literal plagiarism.Originality/value-The proposed model can help academics stay updated by providing summaries of relevant articles.It would eliminate the practice of plagiarism infesting the academic community at an unprecedented pace.The model will also accelerate the process of reviewing academic documents,aiding in the speedy publishing of research articles.展开更多
Purpose-The trend of“Deep Learning for Internet of Things(IoT)”has gained fresh momentum with enormous upcoming applications employing these models as their processing engine and Cloud as their resource giant.But th...Purpose-The trend of“Deep Learning for Internet of Things(IoT)”has gained fresh momentum with enormous upcoming applications employing these models as their processing engine and Cloud as their resource giant.But this picture leads to underutilization of ever-increasing device pool of IoT that has already passed 15 billion mark in 2015.Thus,it is high time to explore a different approach to tackle this issue,keeping in view the characteristics and needs of the two fields.Processing at the Edge can boost applications with realtime deadlines while complementing security.Design/methodology/approach-This review paper contributes towards three cardinal directions of research in the field of DL for IoT.The first section covers the categories of IoT devices and how Fog can aid in overcoming the underutilization of millions of devices,forming the realm of the things for IoT.The second direction handles the issue of immense computational requirements of DL models by uncovering specific compression techniques.An appropriate combination of these techniques,including regularization,quantization,and pruning,can aid in building an effective compression pipeline for establishing DL models for IoT use-cases.The third direction incorporates both these views and introduces a novel approach of parallelization for setting up a distributed systems view of DL for IoT.Findings-DL models are growing deeper with every passing year.Well-coordinated distributed execution of such models using Fog displays a promising future for the IoT application realm.It is realized that a vertically partitioned compressed deep model can handle the trade-off between size,accuracy,communication overhead,bandwidth utilization,and latency but at the expense of an additionally considerable memory footprint.To reduce the memory budget,we propose to exploit Hashed Nets as potentially favorable candidates for distributed frameworks.However,the critical point between accuracy and size for such models needs further investigation.Originality/value-To the best of our knowledge,no study has explored the inherent parallelism in deep neural network architectures for their efficient distribution over the Edge-Fog continuum.Besides covering techniques and frameworks that have tried to bring inference to the Edge,the review uncovers significant issues and possible future directions for endorsing deep models as processing engines for real-time IoT.The study is directed to both researchers and industrialists to take on various applications to the Edge for better user experience.展开更多
基金This work is supported by Technical Education Quality Program-TEQIP III.The project is implemented by NPIU,which is a unit of MHRD,Govt of India for implementation of world bank assisted projects in Technical Education.
文摘Purpose-Natural languages have a fundamental quality of suppleness that makes it possible to present a single idea in plenty of different ways.This feature is often exploited in the academic world,leading to the theft of work referred to as plagiarism.Many approaches have been put forward to detect such cases based on various text features and grammatical structures of languages.However,there is a huge scope of improvement for detecting intelligent plagiarism.Design/methodology/approach-To realize this,the paper introduces a hybrid model to detect intelligent plagiarism by breaking the entire process into three stages:(1)clustering,(2)vector formulation in each cluster based on semantic roles,normalization and similarity index calculation and(3)Summary generation using encoder-decoder.An effective weighing scheme has been introduced to select terms used to build vectors based on K-means,which is calculated on the synonym set for the said term.If the value calculated in the last stage lies above a predefined threshold,only then the next semantic argument is analyzed.When the similarity score for two documents is beyond the threshold,a short summary for plagiarized documents is created.Findings-Experimental results show that this method is able to detect connotation and concealment used in idea plagiarism besides detecting literal plagiarism.Originality/value-The proposed model can help academics stay updated by providing summaries of relevant articles.It would eliminate the practice of plagiarism infesting the academic community at an unprecedented pace.The model will also accelerate the process of reviewing academic documents,aiding in the speedy publishing of research articles.
基金supported by Technical Education Quality Improvement Programme(TEQIP-III)The project is implemented by NPIU which is a unit of MHRD,Govt of India for implementation of World Bank Assisted Projects in Technical Education。
文摘Purpose-The trend of“Deep Learning for Internet of Things(IoT)”has gained fresh momentum with enormous upcoming applications employing these models as their processing engine and Cloud as their resource giant.But this picture leads to underutilization of ever-increasing device pool of IoT that has already passed 15 billion mark in 2015.Thus,it is high time to explore a different approach to tackle this issue,keeping in view the characteristics and needs of the two fields.Processing at the Edge can boost applications with realtime deadlines while complementing security.Design/methodology/approach-This review paper contributes towards three cardinal directions of research in the field of DL for IoT.The first section covers the categories of IoT devices and how Fog can aid in overcoming the underutilization of millions of devices,forming the realm of the things for IoT.The second direction handles the issue of immense computational requirements of DL models by uncovering specific compression techniques.An appropriate combination of these techniques,including regularization,quantization,and pruning,can aid in building an effective compression pipeline for establishing DL models for IoT use-cases.The third direction incorporates both these views and introduces a novel approach of parallelization for setting up a distributed systems view of DL for IoT.Findings-DL models are growing deeper with every passing year.Well-coordinated distributed execution of such models using Fog displays a promising future for the IoT application realm.It is realized that a vertically partitioned compressed deep model can handle the trade-off between size,accuracy,communication overhead,bandwidth utilization,and latency but at the expense of an additionally considerable memory footprint.To reduce the memory budget,we propose to exploit Hashed Nets as potentially favorable candidates for distributed frameworks.However,the critical point between accuracy and size for such models needs further investigation.Originality/value-To the best of our knowledge,no study has explored the inherent parallelism in deep neural network architectures for their efficient distribution over the Edge-Fog continuum.Besides covering techniques and frameworks that have tried to bring inference to the Edge,the review uncovers significant issues and possible future directions for endorsing deep models as processing engines for real-time IoT.The study is directed to both researchers and industrialists to take on various applications to the Edge for better user experience.