首页 > 最新文献

2021 6th International Conference on Computer Science and Engineering (UBMK)最新文献

英文 中文
A Benchmark Study on the Use of WebRTC Technology for Multimedia IoT 多媒体物联网中使用WebRTC技术的基准研究
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558980
M. Seker, H. Kilinç
The increase in Smart Things with video and audio features and multimedia traffic is expected to change the Internet of Things (IoT) architecture. Multimedia applications need high bandwidth and high CPU. WebRTC technology offers opportunities in this regard. In this study, the usability of WebRTC technology for multimedia applications on resource-constrained IoT devices is investigated. In this way, a benchmarking study is conducted to determine the requirements of IoT devices with audio and video capabilities. In the tests performed, the video quality and costs are investigated in low CPU and low bandwidth situations.
具有视频和音频功能以及多媒体流量的智能设备的增加预计将改变物联网(IoT)架构。多媒体应用需要高带宽和高CPU。WebRTC技术在这方面提供了机会。在本研究中,研究了web brtc技术在资源受限的物联网设备上用于多媒体应用的可用性。通过这种方式,进行基准研究以确定具有音频和视频功能的物联网设备的要求。在执行的测试中,研究了低CPU和低带宽情况下的视频质量和成本。
{"title":"A Benchmark Study on the Use of WebRTC Technology for Multimedia IoT","authors":"M. Seker, H. Kilinç","doi":"10.1109/UBMK52708.2021.9558980","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558980","url":null,"abstract":"The increase in Smart Things with video and audio features and multimedia traffic is expected to change the Internet of Things (IoT) architecture. Multimedia applications need high bandwidth and high CPU. WebRTC technology offers opportunities in this regard. In this study, the usability of WebRTC technology for multimedia applications on resource-constrained IoT devices is investigated. In this way, a benchmarking study is conducted to determine the requirements of IoT devices with audio and video capabilities. In the tests performed, the video quality and costs are investigated in low CPU and low bandwidth situations.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Navigation Patterns of a Hybrid Scanning Agent using Uninformed and Informed Search Algorithms for Reactive and Deliberative Behaviors 基于非知情和知情搜索算法的混合扫描代理的导航模式
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558897
Hasibe Çoruh, İremnur Çivioğlu, Cevda Nur Öztürk
Hybrid agent architectures enable effective control layering the agent functions according to the sophistication they require. In this study, assuming a partially observable and deterministic environment, reactive and deliberative behaviors of a hybrid scanning agent were controlled using some uninformed and informed search algorithms, respectively. As the reactive layer decided the agent actions online in an unknown environment, a map of the environment was constructed in parallel. When the reactive layer failed to find a proper action, the deliberative layer proposed a solution offline using the constructed map so that the agent could continue its scanning task. The navigation patterns that were produced with the adapted algorithms in the reactive and deliberative layers were analyzed. The results showed that depth-first search (DFS) and breadth-first search (BFS) algorithms can be used as reactive motion planners for scanning an environment in zigzag and spiral patterns. Simulations in 25 grid-based environments with different sizes and varying percentages of obstacles yielded that running A* algorithm as a deliberative planner, the agent could completely scan the environments with equal successes for all different modes of the developed scanning algorithms. The horizontal mode of the DFS-based scanning algorithm had the least rescan rate on average.
混合代理体系结构能够根据其所需的复杂程度对代理功能进行有效的控制分层。在本研究中,假设一个部分可观察和确定性的环境,混合扫描代理的反应性和慎重性行为分别使用一些不知情和知情搜索算法进行控制。由于反应层决定了智能体在未知环境中的在线行为,因此并行构建了环境映射。当反应层找不到合适的动作时,审议层使用构造好的地图离线提出解决方案,使agent能够继续其扫描任务。分析了在反应层和审议层采用自适应算法生成的导航模式。结果表明,深度优先搜索(DFS)和宽度优先搜索(BFS)算法可以作为反应运动规划器,用于扫描锯齿形和螺旋形的环境。在25个基于网格的不同大小和不同障碍物百分比的环境中进行仿真,结果表明,将A*算法作为一个慎重的计划者来运行,对于所开发的所有不同模式的扫描算法,智能体都可以完全扫描环境,并取得相同的成功。基于dfs的水平模式扫描算法的平均重扫描率最低。
{"title":"Navigation Patterns of a Hybrid Scanning Agent using Uninformed and Informed Search Algorithms for Reactive and Deliberative Behaviors","authors":"Hasibe Çoruh, İremnur Çivioğlu, Cevda Nur Öztürk","doi":"10.1109/UBMK52708.2021.9558897","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558897","url":null,"abstract":"Hybrid agent architectures enable effective control layering the agent functions according to the sophistication they require. In this study, assuming a partially observable and deterministic environment, reactive and deliberative behaviors of a hybrid scanning agent were controlled using some uninformed and informed search algorithms, respectively. As the reactive layer decided the agent actions online in an unknown environment, a map of the environment was constructed in parallel. When the reactive layer failed to find a proper action, the deliberative layer proposed a solution offline using the constructed map so that the agent could continue its scanning task. The navigation patterns that were produced with the adapted algorithms in the reactive and deliberative layers were analyzed. The results showed that depth-first search (DFS) and breadth-first search (BFS) algorithms can be used as reactive motion planners for scanning an environment in zigzag and spiral patterns. Simulations in 25 grid-based environments with different sizes and varying percentages of obstacles yielded that running A* algorithm as a deliberative planner, the agent could completely scan the environments with equal successes for all different modes of the developed scanning algorithms. The horizontal mode of the DFS-based scanning algorithm had the least rescan rate on average.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data 基于实时公共智慧城市数据的AMQP、MQTT和HTTP协议的比较评估
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559032
Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere
MQTT, AMQP and HTTP are messaging protocols that are commonly used for communicating with resource-constrained IoT devices. HTTP is the standard reference protocol for the REST transportation based on the request/response model, whereas both AMQP and MQTT are message-oriented protocols that use the publish/subscribe model. Message-oriented protocols enhance some of the shortcomings of the complex HTTP protocol by using asynchronous communication, changing the design from a document-centric to a data-centric approach and decreasing the header and message sizes. Although significant technical detail is present on these protocols, their real-time performance is insufficiently elaborated. In this paper, we present an experimental evaluation of these protocols conducted in a homogeneous IoT testbed using a real-time Smart City public data set. We provide the behavioral differences between messaging-based protocols and the REST-based HTTP protocol in terms of message latency and CPU usage for varying traffic loads and message sizes. The results showed that MQTT and AMQP are four times faster than HTTP protocol when comparing the message sent latencies. HTTP uses four times more CPU than the AMQP and MQTT protocols. In summary, message-oriented protocols give more stable and improved results as compared to the REST model-based HTTP protocol for all evaluation scenarios.
MQTT、AMQP和HTTP是通常用于与资源受限的物联网设备通信的消息传递协议。HTTP是基于请求/响应模型的REST传输的标准参考协议,而AMQP和MQTT都是使用发布/订阅模型的面向消息的协议。面向消息的协议通过使用异步通信,将设计从以文档为中心更改为以数据为中心,并减少报头和消息大小,从而增强了复杂HTTP协议的一些缺点。虽然这些协议有重要的技术细节,但它们的实时性能没有得到充分的阐述。在本文中,我们使用实时智慧城市公共数据集,在同构物联网测试平台上对这些协议进行了实验评估。我们提供了基于消息的协议和基于rest的HTTP协议在不同流量负载和消息大小的消息延迟和CPU使用方面的行为差异。结果表明,在比较消息发送延迟时,MQTT和AMQP比HTTP协议快4倍。HTTP使用的CPU是AMQP和MQTT协议的四倍。总之,对于所有评估场景,与基于REST模型的HTTP协议相比,面向消息的协议提供了更稳定和改进的结果。
{"title":"A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data","authors":"Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere","doi":"10.1109/UBMK52708.2021.9559032","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559032","url":null,"abstract":"MQTT, AMQP and HTTP are messaging protocols that are commonly used for communicating with resource-constrained IoT devices. HTTP is the standard reference protocol for the REST transportation based on the request/response model, whereas both AMQP and MQTT are message-oriented protocols that use the publish/subscribe model. Message-oriented protocols enhance some of the shortcomings of the complex HTTP protocol by using asynchronous communication, changing the design from a document-centric to a data-centric approach and decreasing the header and message sizes. Although significant technical detail is present on these protocols, their real-time performance is insufficiently elaborated. In this paper, we present an experimental evaluation of these protocols conducted in a homogeneous IoT testbed using a real-time Smart City public data set. We provide the behavioral differences between messaging-based protocols and the REST-based HTTP protocol in terms of message latency and CPU usage for varying traffic loads and message sizes. The results showed that MQTT and AMQP are four times faster than HTTP protocol when comparing the message sent latencies. HTTP uses four times more CPU than the AMQP and MQTT protocols. In summary, message-oriented protocols give more stable and improved results as compared to the REST model-based HTTP protocol for all evaluation scenarios.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network Apk2Img4AndMal:基于卷积神经网络的Android恶意软件检测框架
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558983
Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral
In this study, the Apk2Img4AndMal framework, which provides information about the application without the need for static or dynamic attributes, is recommended. The proposed framework reads APK files in binary format and converts them to grayscale images. In the classification phase of the framework, the convolutional neural network (CNN) is used, which gives successful results in image classification. In this way, the required features are obtained through a CNN. Therefore, there is also no feature extraction phase as other dynamic or static analysis-based frameworks. This property is the most important advantage of the Apk2Img4AndMal framework. The proposed framework is tested with 24588 Android malware and 3000 benign applications. The highest performance achieved in the study is up to 94%, according to the accuracy metric.
在本研究中,推荐使用Apk2Img4AndMal框架,它提供了有关应用程序的信息,而不需要静态或动态属性。该框架以二进制格式读取APK文件,并将其转换为灰度图像。在框架的分类阶段,使用了卷积神经网络(CNN),在图像分类中取得了成功的结果。这样,通过一个CNN就可以得到所需要的特征。因此,也没有像其他基于动态或静态分析的框架那样的特征提取阶段。这个属性是Apk2Img4AndMal框架最重要的优势。该框架在24588个Android恶意软件和3000个良性应用程序中进行了测试。根据准确度指标,研究中达到的最高性能高达94%。
{"title":"Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network","authors":"Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral","doi":"10.1109/UBMK52708.2021.9558983","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558983","url":null,"abstract":"In this study, the Apk2Img4AndMal framework, which provides information about the application without the need for static or dynamic attributes, is recommended. The proposed framework reads APK files in binary format and converts them to grayscale images. In the classification phase of the framework, the convolutional neural network (CNN) is used, which gives successful results in image classification. In this way, the required features are obtained through a CNN. Therefore, there is also no feature extraction phase as other dynamic or static analysis-based frameworks. This property is the most important advantage of the Apk2Img4AndMal framework. The proposed framework is tested with 24588 Android malware and 3000 benign applications. The highest performance achieved in the study is up to 94%, according to the accuracy metric.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSO based Blockchain Committee Member Selection 基于PSO的区块链委员会成员选择
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559004
Marwan S. Jameel, Oguz Yayla
Implementing blockchain systems with less amount of decentralized computation power is a challenging task. One of the most essential solution in scaling the blockchain is selection of a trusted committee (TC). We intend to develop and apply a new method for selecting committee members depending on their reputation via particle swarm optimization (PSO) based update of the behavior of nodes. Indeed, this is the same concept as accumulating participants in the blockchain throughout the previous rounds of the consensus procedure.
实现具有较少分散计算能力的区块链系统是一项具有挑战性的任务。扩展区块链最重要的解决方案之一是选择可信委员会(TC)。我们打算通过基于节点行为更新的粒子群优化(PSO)来开发和应用一种根据声誉来选择委员会成员的新方法。实际上,这与在前几轮协商一致程序中积累区块链参与者的概念是相同的。
{"title":"PSO based Blockchain Committee Member Selection","authors":"Marwan S. Jameel, Oguz Yayla","doi":"10.1109/UBMK52708.2021.9559004","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559004","url":null,"abstract":"Implementing blockchain systems with less amount of decentralized computation power is a challenging task. One of the most essential solution in scaling the blockchain is selection of a trusted committee (TC). We intend to develop and apply a new method for selecting committee members depending on their reputation via particle swarm optimization (PSO) based update of the behavior of nodes. Indeed, this is the same concept as accumulating participants in the blockchain throughout the previous rounds of the consensus procedure.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"93 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks 基于小型蒲公英图像数据集的RepVGG迁移学习、正则化、空间注意、挤压块和激励块分析
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558941
M. Nergiz
The automated weed detection is an important research field in terms of agricultural productivity and economy. This study aims to apply RepVGG which is a new deep learning architecture developed on PyTorch framework and has promising results when trained and tested on ImageNet1K dataset. 920 images of the small sized Dandelion Images dataset is used for this study. Pretrained vanilla, pretrained and dropout regularized, squeeze and excitation block added and spatial attention block added versions of RepVGG are tested on the dataset. VGG16 method is also applied to the dataset and the results of the MobileNetV2 method is taken from the Kaggle Competition to get an insight about the baseline results of the classical state of the art models. The proposed RepVGG modifications could not outperform the state of the art methods on this dataset but the effect of the modifications are deeply analyzed and the best configuration is obtained by Squeeze and Excitation block added RepVGG-A0 architecture which is trained from scratch for 5 epochs and provided results of 0,875, 0,665, 0,89 and 0,74 for Accuracy, Recall, Precision and F1 metrics respectively.
杂草自动检测是农业生产力和经济发展的重要研究领域。RepVGG是在PyTorch框架上开发的一种新的深度学习架构,在ImageNet1K数据集上进行了训练和测试,取得了良好的效果。本研究使用了小型Dandelion images数据集的920张图像。在数据集上测试了预训练vanilla、预训练dropout正则化、添加挤压激励块和添加空间注意块的RepVGG版本。VGG16方法也应用于数据集,MobileNetV2方法的结果取自Kaggle竞赛,以深入了解经典最先进模型的基线结果。在此数据集上,所提出的RepVGG修改不能优于当前最先进的方法,但对修改的效果进行了深入分析,并通过添加了Squeeze和Excitation块的RepVGG- a0架构获得了最佳配置,该架构从零开始训练了5个epoch,在准确率、召回率、精度和F1指标上分别获得了0,875、0,665、0,89和0,74的结果。
{"title":"Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks","authors":"M. Nergiz","doi":"10.1109/UBMK52708.2021.9558941","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558941","url":null,"abstract":"The automated weed detection is an important research field in terms of agricultural productivity and economy. This study aims to apply RepVGG which is a new deep learning architecture developed on PyTorch framework and has promising results when trained and tested on ImageNet1K dataset. 920 images of the small sized Dandelion Images dataset is used for this study. Pretrained vanilla, pretrained and dropout regularized, squeeze and excitation block added and spatial attention block added versions of RepVGG are tested on the dataset. VGG16 method is also applied to the dataset and the results of the MobileNetV2 method is taken from the Kaggle Competition to get an insight about the baseline results of the classical state of the art models. The proposed RepVGG modifications could not outperform the state of the art methods on this dataset but the effect of the modifications are deeply analyzed and the best configuration is obtained by Squeeze and Excitation block added RepVGG-A0 architecture which is trained from scratch for 5 epochs and provided results of 0,875, 0,665, 0,89 and 0,74 for Accuracy, Recall, Precision and F1 metrics respectively.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Random Subspace Based Approach for Stress Classification from Smartphone Data 基于随机子空间的智能手机应力分类方法
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558896
Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli
Stress is an important problem to deal with in today’s society. Thanks to the built-in sensors of smartphones, many operations can be performed unobtrusively. Accordingly, smartphones are among the indispensable data sources of research subjects. In this study, the problem of stress classification was discussed with the data obtained from smartphones. Sensor data were collected to examine users’ writing behavior. The features extracted from the obtained raw data were classified with the random subspace-based structures and their performances were compared. As a result of the study, it was observed that the stacking method showed promising results.
压力是当今社会需要解决的一个重要问题。多亏了智能手机内置的传感器,许多操作都可以在不显眼的情况下进行。因此,智能手机是研究对象不可或缺的数据来源之一。在本研究中,我们利用智能手机上的数据来讨论压力分类问题。收集传感器数据来检查用户的写作行为。将原始数据提取的特征与基于随机子空间的结构进行分类,并对其性能进行比较。研究结果表明,叠层法具有良好的效果。
{"title":"A Random Subspace Based Approach for Stress Classification from Smartphone Data","authors":"Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli","doi":"10.1109/UBMK52708.2021.9558896","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558896","url":null,"abstract":"Stress is an important problem to deal with in today’s society. Thanks to the built-in sensors of smartphones, many operations can be performed unobtrusively. Accordingly, smartphones are among the indispensable data sources of research subjects. In this study, the problem of stress classification was discussed with the data obtained from smartphones. Sensor data were collected to examine users’ writing behavior. The features extracted from the obtained raw data were classified with the random subspace-based structures and their performances were compared. As a result of the study, it was observed that the stacking method showed promising results.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"94 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems 在闭路电视系统中更有效地利用现代目标检测方法的新途径
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558899
Oguzhan Can, Sezai Burak Kantarci, Gozde Unal
DL architectures rely on extensive usage on powerful computer systems to operate in real-time. Therefore, cooperative and constructive optimizations should be made in both architecture and software parts of the related DL system. In this work, input system of the YOLO architecture is modified to accept several sources at the same time with two effective methods to increase the efficiency of the hardware system. First method is to design a scheduler which will allow YOLO architecture to process several input sources sequentially, allowing the architecture to use its full potential. Second method is to design a preprocessing algorithm to combine 4 or 9 input sources in a single input source as a 2x2 or 3x3 image matrix. In this way, YOLO architecture processes four or nine times more images in the same time, increasing its practical frame per second (FPS) value by four or nine folds. Experiment results on our machine show that the used YOLO architecture can process 3 input sources at the same time with only minimal loss of accuracy of 0.002 in terms of Mean Average Precision (mAP) while using the proposed scheduler. Additionally, using 4 inputs combined increases the practical FPS value from 31 to 120 and using 9 inputs increases the practical FPS value from 13 to 108, all while decreasing the mAP value by only 0.008 for 4 inputs and by only 0.034 for 9 inputs. Considering the obtained FPS values and achieved hardware efficiency, these minimal losses of mAP are easily acceptable.
深度学习体系结构依赖于强大的计算机系统的广泛使用来实现实时操作。因此,应该在相关DL系统的架构和软件部分进行协作性和建设性的优化。本文采用两种有效的方法对YOLO体系结构的输入系统进行修改,使其可以同时接受多个输入源,从而提高硬件系统的效率。第一种方法是设计一个调度器,允许YOLO体系结构按顺序处理多个输入源,从而允许体系结构充分发挥其潜力。第二种方法是设计预处理算法,将单个输入源中的4个或9个输入源组合成2x2或3x3图像矩阵。这样,YOLO架构在同一时间内处理的图像数量增加了4到9倍,其实际帧数每秒(FPS)值提高了4到9倍。在我们的机器上的实验结果表明,所使用的YOLO架构可以同时处理3个输入源,在使用所提出的调度器时,平均平均精度(mAP)的精度损失仅为0.002。此外,使用4个输入组合将实际FPS值从31增加到120,使用9个输入将实际FPS值从13增加到108,同时4个输入仅减少0.008,9个输入仅减少0.034。考虑到获得的FPS值和实现的硬件效率,这些最小的mAP损失是可以接受的。
{"title":"A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems","authors":"Oguzhan Can, Sezai Burak Kantarci, Gozde Unal","doi":"10.1109/UBMK52708.2021.9558899","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558899","url":null,"abstract":"DL architectures rely on extensive usage on powerful computer systems to operate in real-time. Therefore, cooperative and constructive optimizations should be made in both architecture and software parts of the related DL system. In this work, input system of the YOLO architecture is modified to accept several sources at the same time with two effective methods to increase the efficiency of the hardware system. First method is to design a scheduler which will allow YOLO architecture to process several input sources sequentially, allowing the architecture to use its full potential. Second method is to design a preprocessing algorithm to combine 4 or 9 input sources in a single input source as a 2x2 or 3x3 image matrix. In this way, YOLO architecture processes four or nine times more images in the same time, increasing its practical frame per second (FPS) value by four or nine folds. Experiment results on our machine show that the used YOLO architecture can process 3 input sources at the same time with only minimal loss of accuracy of 0.002 in terms of Mean Average Precision (mAP) while using the proposed scheduler. Additionally, using 4 inputs combined increases the practical FPS value from 31 to 120 and using 9 inputs increases the practical FPS value from 13 to 108, all while decreasing the mAP value by only 0.008 for 4 inputs and by only 0.034 for 9 inputs. Considering the obtained FPS values and achieved hardware efficiency, these minimal losses of mAP are easily acceptable.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128314310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Artificial Intelligence and Cyber Security 人工智能与网络安全综述
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558949
A. Okutan, Can Eyüpoğlu
Cyber attacks are carried out by unauthorized access to a system connected to an internet network anywhere in the world or by taking control of this system. These attacks continue to increase exponentially with the introduction of artificial intelligence technology, which has been used effectively in the field of science and engineering. With the use of artificial intelligence in the cyber field, conventional cyber attacks have begun to emerge as smart cyber attacks. Software development with traditional algorithms is insufficient to defend against attacks. In this study, studies in the literature on artificial intelligence methods used in the field of cyber security were examined. On the subjects discussed from different perspectives, solutions in terms of defense and attack, the applications used, the contexts between different disciplines, analyzes and examples on the basis of countries will be presented.
网络攻击是通过未经授权访问连接到世界任何地方的互联网网络的系统或通过控制该系统进行的。随着人工智能技术在科学和工程领域的有效应用,这些攻击继续呈指数级增长。随着人工智能在网络领域的应用,传统的网络攻击开始以智能网络攻击的形式出现。使用传统算法开发软件不足以抵御攻击。在本研究中,对人工智能方法在网络安全领域的应用进行了文献研究。关于从不同角度讨论的主题,在防御和攻击方面的解决方案,使用的应用程序,不同学科之间的背景,分析和国家的基础上的例子将被提出。
{"title":"A Review on Artificial Intelligence and Cyber Security","authors":"A. Okutan, Can Eyüpoğlu","doi":"10.1109/UBMK52708.2021.9558949","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558949","url":null,"abstract":"Cyber attacks are carried out by unauthorized access to a system connected to an internet network anywhere in the world or by taking control of this system. These attacks continue to increase exponentially with the introduction of artificial intelligence technology, which has been used effectively in the field of science and engineering. With the use of artificial intelligence in the cyber field, conventional cyber attacks have begun to emerge as smart cyber attacks. Software development with traditional algorithms is insufficient to defend against attacks. In this study, studies in the literature on artificial intelligence methods used in the field of cyber security were examined. On the subjects discussed from different perspectives, solutions in terms of defense and attack, the applications used, the contexts between different disciplines, analyzes and examples on the basis of countries will be presented.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keystroke Dynamics Based Authentication System 基于击键动力学的认证系统
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559008
Nurşah Çevi̇k, S. Akleylek, Kadir Koc
Nowadays, many companies use biometric technologies for the security of critical systems as well as username-password methods. In the literature, biometric systems are the most commonly used systems among the two-factor authentication systems. There are two different approaches to biometric systems: physical and behavioral biometric systems. In the last decade, the accuracy of behavioral biometric systems has significantly increased with the use of machine learning methods in these systems. For this reason, the usage areas of the studies in this field have expanded. In this study, we focus on keystroke dynamics based on behavioral methods. Firstly, we make a web application to collect keystroke data from 54 employees in a company. Then, we use the benchmark database and our database to train-test machine learning algorithms, which have the highest accuracy in this field in the literature. Among them, tree-based algorithms have the highest accuracy score, with an average of 0.94.
如今,许多公司使用生物识别技术来保护关键系统的安全,以及用户名-密码方法。在文献中,生物识别系统是双因素认证系统中最常用的系统。生物识别系统有两种不同的方法:物理生物识别系统和行为生物识别系统。在过去的十年中,随着机器学习方法在这些系统中的使用,行为生物识别系统的准确性显著提高。因此,这一领域的研究的应用领域不断扩大。在本研究中,我们重点研究基于行为方法的击键动力学。首先,我们制作了一个web应用程序来收集某公司54名员工的击键数据。然后,我们使用基准数据库和我们的数据库对机器学习算法进行训练测试,这是目前文献中该领域准确率最高的算法。其中,基于树的算法准确率最高,平均为0.94。
{"title":"Keystroke Dynamics Based Authentication System","authors":"Nurşah Çevi̇k, S. Akleylek, Kadir Koc","doi":"10.1109/UBMK52708.2021.9559008","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559008","url":null,"abstract":"Nowadays, many companies use biometric technologies for the security of critical systems as well as username-password methods. In the literature, biometric systems are the most commonly used systems among the two-factor authentication systems. There are two different approaches to biometric systems: physical and behavioral biometric systems. In the last decade, the accuracy of behavioral biometric systems has significantly increased with the use of machine learning methods in these systems. For this reason, the usage areas of the studies in this field have expanded. In this study, we focus on keystroke dynamics based on behavioral methods. Firstly, we make a web application to collect keystroke data from 54 employees in a company. Then, we use the benchmark database and our database to train-test machine learning algorithms, which have the highest accuracy in this field in the literature. Among them, tree-based algorithms have the highest accuracy score, with an average of 0.94.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 6th International Conference on Computer Science and Engineering (UBMK)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1