首页 > 最新文献

2023 IEEE International Conference on Electro Information Technology (eIT)最新文献

英文 中文
Correlation of Egg counts, Micro-nutrients, and NDVI Distribution for Accurate Tracking of SCN Population Density Detection 卵数、微量营养素和NDVI分布的相关性用于精确跟踪SCN种群密度检测
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187314
Anton Skurdal, Youness Arjoune, Niroop Sugunaraj, Shree Ram Abayankar Balaji, Sreejith V. Nair, Prakash Ranganathan, Burton Johnson
Soybean Cyst Nematode (SCN) is a serious pathogen in soybean production and contributes to annual economic losses of more than $1.5 billion (1996–2016) in the U.S. SCN is a microscopic thread-like nematode that burrows into the roots of soybean plants and typically cannot be identified above ground. The paper investigates multitude of variables such as NDVI from multi-spectral images, egg counts, and micro-nutrient composition (e.g., pH, nitrogen, phosphorus, potassium) across two SCN-prone field plots in Casselton/Prosper, North Dakota. The preliminary results indicate that NDVI is a good metric to track for SCN density population during planting, growing, and harvesting periods along with other historical ground truth data. Also, a contour plot using Empirical Bayesian Kriging (EBK) was designed by integrating NDVI and egg count data for co-tracking distribution changes. Such access to ground truth data (i.e., aerial and soil properties) will enable the development and training of robust machine learning models for predicting SCN hotspots.
大豆囊肿线虫(Soybean囊肿Nematode, SCN)是大豆生产中的一种严重病原体,在1996年至2016年期间,每年给美国造成超过15亿美元的经济损失。SCN是一种微小的丝状线虫,钻入大豆植物的根部,通常在地面上无法识别。本文调查了北达科他州Casselton/Prosper两个scn易发地块的多种变量,如来自多光谱图像的NDVI、卵数和微量营养成分(如pH、氮、磷、钾)。初步结果表明,NDVI是一个很好的指标,用于跟踪种植、生长和收获期间的SCN密度种群,以及其他历史地面真实数据。结合NDVI和卵数数据,设计了基于经验贝叶斯克里格(EBK)的等高线图,共同跟踪分布变化。这种对地面真实数据(即空气和土壤属性)的访问将使开发和训练用于预测SCN热点的强大机器学习模型成为可能。
{"title":"Correlation of Egg counts, Micro-nutrients, and NDVI Distribution for Accurate Tracking of SCN Population Density Detection","authors":"Anton Skurdal, Youness Arjoune, Niroop Sugunaraj, Shree Ram Abayankar Balaji, Sreejith V. Nair, Prakash Ranganathan, Burton Johnson","doi":"10.1109/eIT57321.2023.10187314","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187314","url":null,"abstract":"Soybean Cyst Nematode (SCN) is a serious pathogen in soybean production and contributes to annual economic losses of more than $1.5 billion (1996–2016) in the U.S. SCN is a microscopic thread-like nematode that burrows into the roots of soybean plants and typically cannot be identified above ground. The paper investigates multitude of variables such as NDVI from multi-spectral images, egg counts, and micro-nutrient composition (e.g., pH, nitrogen, phosphorus, potassium) across two SCN-prone field plots in Casselton/Prosper, North Dakota. The preliminary results indicate that NDVI is a good metric to track for SCN density population during planting, growing, and harvesting periods along with other historical ground truth data. Also, a contour plot using Empirical Bayesian Kriging (EBK) was designed by integrating NDVI and egg count data for co-tracking distribution changes. Such access to ground truth data (i.e., aerial and soil properties) will enable the development and training of robust machine learning models for predicting SCN hotspots.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114025187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles 用于检测无人机GPS欺骗攻击的监督深度学习模型
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187274
T. T. Khoei, Ghilas Aissou, K. Shamaileh, V. Devabhaktuni, N. Kaabouch
Unmanned Aerial Networks (UAVs) are prone to several cyber-atttacks, including Global Positioining Spoofing attacks. For this purpose, numerous studies have been conducted to detect, classify, and mitigate these attacks, using Artificial Intelligence technqiues; howver, most of these studies provided techniques with low detection, high misdetection, and high bias rates. To fill this gap, in this paper, we propose three supervised deep learning techniques, namely Deep Neural Network, U Neural Network, and Long Short Term Memory. These models are evaluated in terms of Accuracy, Detection Rate, Misdetection Rate, False Alarm Rate, Training Time per Sample, Prediction Time, and Memory Size. The simulation results indicated that the U Neural Network outperforms other models with accuracy of 98.80%, a probability of detection of 98.85%, a misdetection of 1.15%, a false alarm of 1.8%, a training time per sample of 0.22 seconds, a prediction time of 0.2 seconds, and a memory size of 199.87 MiB. In addition, these results depicted that the Long Short Term Memory model provides the lowest performance among other models for detecting these attacks on UAVs.
无人机容易受到多种网络攻击,包括全球定位欺骗攻击。为此,已经进行了大量的研究来检测、分类和减轻这些攻击,使用人工智能技术;然而,这些研究大多提供了低检出率、高误检率和高偏倚率的技术。为了填补这一空白,在本文中,我们提出了三种监督深度学习技术,即深度神经网络,U神经网络和长短期记忆。这些模型根据准确率、检测率、误检率、虚警率、每个样本的训练时间、预测时间和内存大小进行评估。仿真结果表明,U神经网络优于其他模型,准确率为98.80%,检测概率为98.85%,误检率为1.15%,虚警率为1.8%,每样本训练时间为0.22秒,预测时间为0.2秒,内存大小为199.87 MiB。此外,这些结果表明,在检测无人机攻击的其他模型中,长短期记忆模型的性能最低。
{"title":"Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles","authors":"T. T. Khoei, Ghilas Aissou, K. Shamaileh, V. Devabhaktuni, N. Kaabouch","doi":"10.1109/eIT57321.2023.10187274","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187274","url":null,"abstract":"Unmanned Aerial Networks (UAVs) are prone to several cyber-atttacks, including Global Positioining Spoofing attacks. For this purpose, numerous studies have been conducted to detect, classify, and mitigate these attacks, using Artificial Intelligence technqiues; howver, most of these studies provided techniques with low detection, high misdetection, and high bias rates. To fill this gap, in this paper, we propose three supervised deep learning techniques, namely Deep Neural Network, U Neural Network, and Long Short Term Memory. These models are evaluated in terms of Accuracy, Detection Rate, Misdetection Rate, False Alarm Rate, Training Time per Sample, Prediction Time, and Memory Size. The simulation results indicated that the U Neural Network outperforms other models with accuracy of 98.80%, a probability of detection of 98.85%, a misdetection of 1.15%, a false alarm of 1.8%, a training time per sample of 0.22 seconds, a prediction time of 0.2 seconds, and a memory size of 199.87 MiB. In addition, these results depicted that the Long Short Term Memory model provides the lowest performance among other models for detecting these attacks on UAVs.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Two Deep Learning Neural Networks for Defect Detection in Steel Structures Using UAS 基于UAS的两种深度学习神经网络钢结构缺陷检测的比较分析
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187308
Rajrup Mitra, Amrita Das, Jack Heichel, S. Dorafshan, N. Kaabouch
Steel is used in different infrastructural constructions. The durability and serviceability of steel made it more suitable than other construction materials. However, exposure to weather elements can cause defects in steel structures. Early detection and treatment of structural defects can prevent the structure from becoming more damaged and more expensive to repair. Corrosion resistance and fatigue strength in any steel structure can be influenced by defects such as patches, scratches, and coating erosion. Current methods to detect steel defects are based on manual visual inspection. Autonomous UAS imaging-based defect detection methods have shown promising results in terms of accuracy and time. This paper compares the performance of two deep learning models, InceptionResnetV2 and ResNet152V2, for detecting steel defects. These models were trained in transfer learning mode and tested on two different datasets, the Severstal dataset present on Kaggle and a dataset generated by the authors of this paper. The results show that ResNet152V2 outperforms InceptionResnetV2 with an average accuracy of 95% and a misdetection rate of 5%. Overall, both the models, ResNet152V2 and InceptionResNetV2, showed an improvement of 12.59% and 9.59%, respectively, compared to MobileNet used in a previous study, when all were trained and tested on the Severstal dataset.
钢被用于不同的基础设施建设。钢的耐久性和适用性使它比其他建筑材料更适用。然而,暴露在天气因素下会导致钢结构的缺陷。结构缺陷的早期发现和处理可以防止结构变得更加损坏和更昂贵的修复。任何钢结构的耐蚀性和疲劳强度都会受到诸如补丁、划痕和涂层侵蚀等缺陷的影响。目前检测钢材缺陷的方法是基于人工目视检测。基于自主无人机成像的缺陷检测方法在精度和时间方面显示出良好的结果。本文比较了两种深度学习模型InceptionResnetV2和ResNet152V2在钢材缺陷检测中的性能。这些模型在迁移学习模式下进行了训练,并在两个不同的数据集上进行了测试,一个是Kaggle上的Severstal数据集,另一个是本文作者生成的数据集。结果表明,ResNet152V2的平均准确率为95%,误检率为5%,优于InceptionResnetV2。总的来说,当所有模型都在Severstal数据集上进行训练和测试时,与之前研究中使用的MobileNet相比,ResNet152V2和InceptionResNetV2模型分别显示了12.59%和9.59%的改进。
{"title":"A Comparative Analysis of Two Deep Learning Neural Networks for Defect Detection in Steel Structures Using UAS","authors":"Rajrup Mitra, Amrita Das, Jack Heichel, S. Dorafshan, N. Kaabouch","doi":"10.1109/eIT57321.2023.10187308","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187308","url":null,"abstract":"Steel is used in different infrastructural constructions. The durability and serviceability of steel made it more suitable than other construction materials. However, exposure to weather elements can cause defects in steel structures. Early detection and treatment of structural defects can prevent the structure from becoming more damaged and more expensive to repair. Corrosion resistance and fatigue strength in any steel structure can be influenced by defects such as patches, scratches, and coating erosion. Current methods to detect steel defects are based on manual visual inspection. Autonomous UAS imaging-based defect detection methods have shown promising results in terms of accuracy and time. This paper compares the performance of two deep learning models, InceptionResnetV2 and ResNet152V2, for detecting steel defects. These models were trained in transfer learning mode and tested on two different datasets, the Severstal dataset present on Kaggle and a dataset generated by the authors of this paper. The results show that ResNet152V2 outperforms InceptionResnetV2 with an average accuracy of 95% and a misdetection rate of 5%. Overall, both the models, ResNet152V2 and InceptionResNetV2, showed an improvement of 12.59% and 9.59%, respectively, compared to MobileNet used in a previous study, when all were trained and tested on the Severstal dataset.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-time Machine Learning-based GPS Spoofing Solution for Location-dependent UAV Applications 一种基于实时机器学习的定位依赖型无人机GPS欺骗解决方案
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187344
Mohammad Nayfeh, Joshua Price, M. Alkhatib, K. Shamaileh, N. Kaabouch, Vijay K. Devabhakuni
In this paper, a three-class machine learning (ML) model is implemented on an unmanned aerial vehicle (UAV) with a Raspberry Pi processor for classifying two global positioning system (GPS) spoofing attacks (i.e., static, dynamic) in real-time. First, several models are developed and tested utilizing a dataset collected in a previous work. This dataset conveys GPS-specific features, including location information. Models evaluations are carried out using the detection rate, F-score, false alarm rate, and misdetection rate, which all showed an acceptable performance. Then, the optimum model is loaded to the processor and tested for real-time detection and classification. Location-dependent applications, such as fixed-route public transportations are expected to benefit from the methodology presented herein as the longitude, latitude, and altitude features are characterized in the developed model.
本文利用树莓派处理器在无人机(UAV)上实现了三级机器学习(ML)模型,用于实时分类两种全球定位系统(GPS)欺骗攻击(即静态,动态)。首先,利用先前工作中收集的数据集开发和测试了几个模型。该数据集传达gps特定的特征,包括位置信息。使用检测率、F-score、虚警率和误检率对模型进行评估,均显示出可接受的性能。然后,将最优模型加载到处理器中,并进行实时检测和分类测试。依赖于位置的应用,如固定路线的公共交通,预计将受益于本文提出的方法,因为所开发的模型中具有经度、纬度和海拔特征。
{"title":"A Real-time Machine Learning-based GPS Spoofing Solution for Location-dependent UAV Applications","authors":"Mohammad Nayfeh, Joshua Price, M. Alkhatib, K. Shamaileh, N. Kaabouch, Vijay K. Devabhakuni","doi":"10.1109/eIT57321.2023.10187344","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187344","url":null,"abstract":"In this paper, a three-class machine learning (ML) model is implemented on an unmanned aerial vehicle (UAV) with a Raspberry Pi processor for classifying two global positioning system (GPS) spoofing attacks (i.e., static, dynamic) in real-time. First, several models are developed and tested utilizing a dataset collected in a previous work. This dataset conveys GPS-specific features, including location information. Models evaluations are carried out using the detection rate, F-score, false alarm rate, and misdetection rate, which all showed an acceptable performance. Then, the optimum model is loaded to the processor and tested for real-time detection and classification. Location-dependent applications, such as fixed-route public transportations are expected to benefit from the methodology presented herein as the longitude, latitude, and altitude features are characterized in the developed model.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125788414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Image Forgery Detection Using Natural Scene Statistics 基于自然场景统计的机器学习图像伪造检测
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187328
M. Rehman, I. Nizami, Ali Ahsan, K. Chong
A copy-move image forgery is the most common type of image tampering. It can be done by copying a part of an image and paste on another part of the same image. Therefore, it can be one of the challenging tasks to find that forgery. This paper suggested a different approach to detect the copy move image forgery by the natural scene statistic features. These features are extracted from both original and forged images of MICC-F2000 dataset. Natural scene statistics are the statistical properties of any natural image captured by any camera, so an attempt of forging an image makes these properties un-natural. By this method, an original and forged images can be easily classified by state-of-the-art machine learning models trained on these features. The performance of this method is quantitatively assessed using the famous evaluation metrics i-e accuracy, TPR, FPR, TNR, Recall and F1-score. A comparison with other state-of-the-art techniques has shown that the proposed technique has shown better results in comparison with the other techniques.
复制-移动图像伪造是最常见的图像篡改类型。它可以通过复制图像的一部分并粘贴到同一图像的另一部分来完成。因此,找到伪造品可能是一项具有挑战性的任务。本文提出了一种利用自然场景统计特征检测复制运动图像伪造的新方法。这些特征分别从MICC-F2000数据集的原始图像和伪造图像中提取。自然场景统计是任何相机捕获的任何自然图像的统计属性,因此试图伪造图像会使这些属性变得不自然。通过这种方法,可以通过对这些特征进行训练的最先进的机器学习模型轻松地对原始和伪造图像进行分类。采用准确率、TPR、FPR、TNR、Recall和F1-score等著名的评价指标对该方法的性能进行了定量评价。与其他先进技术的比较表明,与其他技术相比,所提出的技术显示出更好的结果。
{"title":"Machine Learning Based Image Forgery Detection Using Natural Scene Statistics","authors":"M. Rehman, I. Nizami, Ali Ahsan, K. Chong","doi":"10.1109/eIT57321.2023.10187328","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187328","url":null,"abstract":"A copy-move image forgery is the most common type of image tampering. It can be done by copying a part of an image and paste on another part of the same image. Therefore, it can be one of the challenging tasks to find that forgery. This paper suggested a different approach to detect the copy move image forgery by the natural scene statistic features. These features are extracted from both original and forged images of MICC-F2000 dataset. Natural scene statistics are the statistical properties of any natural image captured by any camera, so an attempt of forging an image makes these properties un-natural. By this method, an original and forged images can be easily classified by state-of-the-art machine learning models trained on these features. The performance of this method is quantitatively assessed using the famous evaluation metrics i-e accuracy, TPR, FPR, TNR, Recall and F1-score. A comparison with other state-of-the-art techniques has shown that the proposed technique has shown better results in comparison with the other techniques.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Project-Based Learning on Solar Energy from Different Light Sources 基于项目的不同光源太阳能学习
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187367
Cole Fulton, Lara Taha, T. Emami
This paper presents project-based Learning on solar energy for undergraduate junior-level Electrical Engineering students. In this project, students conduct experiments to analyze and plot the impact of distance, incidence angle, and source brightness and shading on the given small solar panel. Second, they conduct experiments to investigate the effect of temperature on the solar panel. Third, students conduct experiments to analyze solar panel characteristics in series and parallel connections. Fourth, they design and build a circuit with different loads to explore solar panel characteristics by measuring a load's voltage, current, and power. Finally, they compare the electric powers produced by artificial and natural light sources in part of the measurement. The data collection utilizes an Arduino Uno, and an Adafruit DC sensor to ensure human errors are at a minimum.
本文提出了一种基于项目的太阳能学习方法。在这个项目中,学生通过实验来分析和绘制距离、入射角、光源亮度和阴影对给定小型太阳能电池板的影响。其次,他们进行实验来研究温度对太阳能电池板的影响。第三,学生进行实验,分析太阳能板串联和并联的特性。第四,他们设计并建造了一个不同负载的电路,通过测量负载的电压、电流和功率来探索太阳能电池板的特性。最后,在部分测量中,他们比较了人工光源和自然光源产生的电能。数据收集使用Arduino Uno和Adafruit直流传感器,以确保人为错误降到最低。
{"title":"A Project-Based Learning on Solar Energy from Different Light Sources","authors":"Cole Fulton, Lara Taha, T. Emami","doi":"10.1109/eIT57321.2023.10187367","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187367","url":null,"abstract":"This paper presents project-based Learning on solar energy for undergraduate junior-level Electrical Engineering students. In this project, students conduct experiments to analyze and plot the impact of distance, incidence angle, and source brightness and shading on the given small solar panel. Second, they conduct experiments to investigate the effect of temperature on the solar panel. Third, students conduct experiments to analyze solar panel characteristics in series and parallel connections. Fourth, they design and build a circuit with different loads to explore solar panel characteristics by measuring a load's voltage, current, and power. Finally, they compare the electric powers produced by artificial and natural light sources in part of the measurement. The data collection utilizes an Arduino Uno, and an Adafruit DC sensor to ensure human errors are at a minimum.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Wing Flap Sounds to Distinguish Individual Birds 用拍打翅膀的声音来区分鸟类
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187233
Thinh Phan, R. Green
To monitor male and female bird nest attendance, the traditional methods are physical markings for identification. This paper presents two methods-Principal Component Analysis (PCA) combined with K Nearest Neighbor (KNN) and Cross-Correlation classification-that can identify individual birds based on the sounds of their wing flaps without the need for physically marking the birds. The study conducted on three male Zebra Finch birds resulted in identification accuracy ranging from 70% to 100%. To distinguish between individual birds, the conventional invasive technique involves capturing, marking, releasing, and recapturing. However, this approach has various limitations and drawbacks. As an alternative solution, researchers have resorted to using bird vocalizations for identification purposes. This research shows that birds can also be uniquely identified from the sounds produced by their wing flaps.
为了监测雄性和雌性鸟巢的出勤率,传统的方法是用物理标记进行识别。本文提出了两种方法——主成分分析(PCA)结合K近邻(KNN)和相互关联分类——可以根据振翅的声音来识别单个鸟类,而不需要对鸟类进行物理标记。对三只雄性斑胸草雀进行的研究结果表明,识别准确率在70%到100%之间。为了区分鸟类个体,传统的入侵技术包括捕获、标记、释放和再捕获。然而,这种方法有各种限制和缺点。作为一种替代解决方案,研究人员利用鸟类的叫声来进行识别。这项研究表明,鸟类也可以通过振翅发出的声音来识别。
{"title":"Using Wing Flap Sounds to Distinguish Individual Birds","authors":"Thinh Phan, R. Green","doi":"10.1109/eIT57321.2023.10187233","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187233","url":null,"abstract":"To monitor male and female bird nest attendance, the traditional methods are physical markings for identification. This paper presents two methods-Principal Component Analysis (PCA) combined with K Nearest Neighbor (KNN) and Cross-Correlation classification-that can identify individual birds based on the sounds of their wing flaps without the need for physically marking the birds. The study conducted on three male Zebra Finch birds resulted in identification accuracy ranging from 70% to 100%. To distinguish between individual birds, the conventional invasive technique involves capturing, marking, releasing, and recapturing. However, this approach has various limitations and drawbacks. As an alternative solution, researchers have resorted to using bird vocalizations for identification purposes. This research shows that birds can also be uniquely identified from the sounds produced by their wing flaps.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement ChatGPT:攻击向量供应链管理改进的奇特案例
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187385
M. Chowdhury, Nafiz Rifat, Shadman Latif, M. Ahsan, Md Saifur Rahman, Rahul Gomes
The field of Natural Language Processing has observed significant advancements in the development of sophisticated conversational Artificial Intelligence systems. ChatGPT is one such state-of-the-art conversational system that has attracted considerable interest and adoption. It enables developers to create highly interactive and engaging conversational applications using deep neural networks to produce human-like responses to user inputs. Such capabilities have made it popular in the threat actors' world. However, threat actors can abuse this chatbot to generate attack vectors as part of an operation. ChatGPT can be abused to produce practical and realistic communications that can be used in phishing attacks. These communications help the attack vectors distribution, i.e., prompt users to download and set up malware or disclose confidential information. ChatGPT has security measures to prevent malicious queries from generating attack vectors. However, the threat actors can circumvent such security controls through deception. This abusive use of ChatGPT makes the supply chain management of attack vectors effective and efficient. In this study, we presented evidence from various sources, showing how ChatGPT is abused to help the threat actors to improve each step of the attack vectors' supply chain management.
自然语言处理领域在复杂的会话人工智能系统的发展方面取得了重大进展。ChatGPT就是这样一个最先进的会话系统,它吸引了大量的兴趣和采用。它使开发人员能够使用深度神经网络创建高度交互式和引人入胜的会话应用程序,以对用户输入产生类似人类的响应。这样的能力使它在威胁行为者的世界里很受欢迎。然而,威胁参与者可以滥用这个聊天机器人来生成攻击向量,作为操作的一部分。ChatGPT可以被滥用来产生可用于网络钓鱼攻击的实际和现实通信。这些通信有助于攻击媒介的传播,即提示用户下载和设置恶意软件或泄露机密信息。ChatGPT具有防止恶意查询生成攻击向量的安全措施。然而,威胁行为者可以通过欺骗绕过这些安全控制。这种对ChatGPT的滥用使得攻击向量的供应链管理变得有效和高效。在本研究中,我们提供了来自各种来源的证据,展示了ChatGPT如何被滥用,以帮助威胁参与者改进攻击向量供应链管理的每个步骤。
{"title":"ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement","authors":"M. Chowdhury, Nafiz Rifat, Shadman Latif, M. Ahsan, Md Saifur Rahman, Rahul Gomes","doi":"10.1109/eIT57321.2023.10187385","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187385","url":null,"abstract":"The field of Natural Language Processing has observed significant advancements in the development of sophisticated conversational Artificial Intelligence systems. ChatGPT is one such state-of-the-art conversational system that has attracted considerable interest and adoption. It enables developers to create highly interactive and engaging conversational applications using deep neural networks to produce human-like responses to user inputs. Such capabilities have made it popular in the threat actors' world. However, threat actors can abuse this chatbot to generate attack vectors as part of an operation. ChatGPT can be abused to produce practical and realistic communications that can be used in phishing attacks. These communications help the attack vectors distribution, i.e., prompt users to download and set up malware or disclose confidential information. ChatGPT has security measures to prevent malicious queries from generating attack vectors. However, the threat actors can circumvent such security controls through deception. This abusive use of ChatGPT makes the supply chain management of attack vectors effective and efficient. In this study, we presented evidence from various sources, showing how ChatGPT is abused to help the threat actors to improve each step of the attack vectors' supply chain management.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130829098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Can Machine Learning Models be Used to Predict Pollutants based on Measured Other Pollutants? 机器学习模型可以用于基于测量的其他污染物来预测污染物吗?
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187232
Steven B. Poore, Cristinel Ababei
In this paper, we investigate the use of machine learning (ML) models to estimate or predict concentrations of pollutants based on measured concentrations of other pollutants. Such models could be used in air quality index (AQI) detection systems to decrease the number of physical sensors in order to reduce overall and maintenance costs. Five different long-short term memory (LSTM) models were explored in the preliminary investigation. The most accurate model was then selected for further refinement via simple hyperparameter search. The final refined model was trained and tested on four different air quality datasets from four different countries. Simulation results indicate that prediction of pollutant concentrations based solely on measured concentrations of other pollutants is not accurate enough to warrant total sensor replacement with ML models. However, when the same ML models are provided as input past measurements of the predicted pollutant rather than previously predicted values, the prediction accuracy is excellent. We conclude that while ML models are not yet accurate enough to completely replace physical sensors, such models could be very helpful to provide predictions in situations of sensor failure and thus to guarantee continuous sensor fusion processes.
在本文中,我们研究了机器学习(ML)模型的使用,以基于测量的其他污染物浓度来估计或预测污染物浓度。这种模型可用于空气质量指数(AQI)检测系统,以减少物理传感器的数量,从而降低总体和维护成本。初步探讨了五种不同的长短期记忆模型。然后通过简单的超参数搜索选择最准确的模型进行进一步细化。最终的改进模型在来自四个不同国家的四个不同的空气质量数据集上进行了训练和测试。模拟结果表明,仅根据其他污染物的测量浓度来预测污染物浓度是不够准确的,不足以保证用ML模型替换全部传感器。然而,当提供相同的ML模型作为输入预测污染物的过去测量值而不是先前的预测值时,预测精度非常好。我们得出的结论是,虽然ML模型还不够精确,无法完全取代物理传感器,但这种模型可能非常有助于在传感器故障的情况下提供预测,从而保证传感器融合过程的连续性。
{"title":"Can Machine Learning Models be Used to Predict Pollutants based on Measured Other Pollutants?","authors":"Steven B. Poore, Cristinel Ababei","doi":"10.1109/eIT57321.2023.10187232","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187232","url":null,"abstract":"In this paper, we investigate the use of machine learning (ML) models to estimate or predict concentrations of pollutants based on measured concentrations of other pollutants. Such models could be used in air quality index (AQI) detection systems to decrease the number of physical sensors in order to reduce overall and maintenance costs. Five different long-short term memory (LSTM) models were explored in the preliminary investigation. The most accurate model was then selected for further refinement via simple hyperparameter search. The final refined model was trained and tested on four different air quality datasets from four different countries. Simulation results indicate that prediction of pollutant concentrations based solely on measured concentrations of other pollutants is not accurate enough to warrant total sensor replacement with ML models. However, when the same ML models are provided as input past measurements of the predicted pollutant rather than previously predicted values, the prediction accuracy is excellent. We conclude that while ML models are not yet accurate enough to completely replace physical sensors, such models could be very helpful to provide predictions in situations of sensor failure and thus to guarantee continuous sensor fusion processes.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gastrointestinal Endoscopic Image Classification using a Novel Wavelet Decomposition Based Deep Learning Algorithm 基于小波分解的胃肠内镜图像分类
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187226
A. Sethi, S. Damani, Arshia K. Sethi, Anjali Rajagopal, K. Gopalakrishnan, A. Cherukuri, S. P. Arunachalam
More than 11% of Americans are affected by diseases related to the gastrointestinal (GI) tract. GI endoscopy is an established imaging modality for diagnostic and therapeutic procedures. Large volumes of images and videos generated during this procedure, makes image interpretation cumbersome and varies among physicians. Artificial intelligence (AI) assisted Computer-Aided Diagnosis (CAD) system for digital GI endoscopy is gaining attention that can disrupt GI practice. Several studies have reported the application of computer vision and machine learning algorithms in GI endoscopy. Endoscopic images of varying anatomic features of the Gi tract, challenges their accurate classification. Therefore, a need exists in accurately classifying different GI endoscopic images for upstream processing in the diagnostic platform for digital GI endoscopy. The purpose of this work was to develop a deep learning model using convolutional neural network (CNN) and wavelet decomposed CNN for improved accuracy using publically available GI endoscopic images from Kvasir dataset with 8 different image groups namely Z-line, Pylorus, Cecum, Esophagitis, Polyps, Ulcerative Colitis, Dyed and Lifted Polyps & Dyed Resection Margins. Wavelet decomposition along with CNN architecture allows utilization of spectral information which is mostly lost in conventional CNNs that can enhance model performance. The models were trained with 80% images and 20% were used for testing and accuracy was compared. 10% improvement in accuracy for multi-class classification was observed with wavelet CNN model compared to conventional CNN. The results indicate the potential of image decomposition methods for enhancing digital GI endoscopic procedures.
超过11%的美国人受到与胃肠道有关的疾病的影响。胃肠道内窥镜检查是诊断和治疗程序的既定成像方式。在此过程中产生的大量图像和视频使得图像解释变得繁琐,并且因医生而异。人工智能(AI)辅助计算机辅助诊断(CAD)系统用于数字胃肠道内窥镜越来越受到关注,可能会破坏胃肠道的实践。一些研究报道了计算机视觉和机器学习算法在胃肠道内窥镜检查中的应用。内镜图像的不同解剖特征的胃肠道,挑战他们的准确分类。因此,需要对不同的消化道内镜图像进行准确分类,以便在数字化消化道内镜诊断平台中进行上游处理。这项工作的目的是使用卷积神经网络(CNN)和小波分解CNN开发一个深度学习模型,以提高准确性,使用来自Kvasir数据集的公开可用的GI内镜图像,包括8个不同的图像组,即z线,幽门,盲肠,食管炎,息肉,溃疡性结肠炎,染色和去除息肉以及染色切除边缘。小波分解结合CNN架构,利用了传统CNN中大多丢失的频谱信息,提高了模型性能。用80%的图像训练模型,用20%的图像进行测试,并比较准确率。与传统CNN模型相比,小波CNN模型的多类分类准确率提高了10%。结果表明,图像分解方法的潜力,以提高数字胃肠道内镜程序。
{"title":"Gastrointestinal Endoscopic Image Classification using a Novel Wavelet Decomposition Based Deep Learning Algorithm","authors":"A. Sethi, S. Damani, Arshia K. Sethi, Anjali Rajagopal, K. Gopalakrishnan, A. Cherukuri, S. P. Arunachalam","doi":"10.1109/eIT57321.2023.10187226","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187226","url":null,"abstract":"More than 11% of Americans are affected by diseases related to the gastrointestinal (GI) tract. GI endoscopy is an established imaging modality for diagnostic and therapeutic procedures. Large volumes of images and videos generated during this procedure, makes image interpretation cumbersome and varies among physicians. Artificial intelligence (AI) assisted Computer-Aided Diagnosis (CAD) system for digital GI endoscopy is gaining attention that can disrupt GI practice. Several studies have reported the application of computer vision and machine learning algorithms in GI endoscopy. Endoscopic images of varying anatomic features of the Gi tract, challenges their accurate classification. Therefore, a need exists in accurately classifying different GI endoscopic images for upstream processing in the diagnostic platform for digital GI endoscopy. The purpose of this work was to develop a deep learning model using convolutional neural network (CNN) and wavelet decomposed CNN for improved accuracy using publically available GI endoscopic images from Kvasir dataset with 8 different image groups namely Z-line, Pylorus, Cecum, Esophagitis, Polyps, Ulcerative Colitis, Dyed and Lifted Polyps & Dyed Resection Margins. Wavelet decomposition along with CNN architecture allows utilization of spectral information which is mostly lost in conventional CNNs that can enhance model performance. The models were trained with 80% images and 20% were used for testing and accuracy was compared. 10% improvement in accuracy for multi-class classification was observed with wavelet CNN model compared to conventional CNN. The results indicate the potential of image decomposition methods for enhancing digital GI endoscopic procedures.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE International Conference on Electro Information Technology (eIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1