首页 > 最新文献

2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)最新文献

英文 中文
Design and Simulation of AES S-Box Towards Data Security in Video Surveillance Using IP Core Generator 利用IP核发生器实现视频监控数据安全的AES S-Box设计与仿真
M. Hammad, W. Elmedany, Y. Ismail
Broadcasting applications such as video surveillance systems are using High Definition (HD) videos. The use of high-resolution videos increases significantly the data volume of video coding standards such as High-Efficiency Video Coding (HEVC) and Advanced Video Coding (AVC), which increases the challenge for storing, processing, encrypting, and transmitting these data over different communication channels. Video compression standards use state-of-the-art techniques to compress raw video sequences more efficiently, such techniques require high computational complexity and memory utilization. With the emergent of using HEVC and video surveillance systems, many security risks arise such as man-in-the-middle attacks, and unauthorized disclosure. Such risks can be mitigated by encrypting the traffic of HEVC. The most widely used encryption algorithm is the Advanced Encryption Standard (AES). Most of the computational complexity in AES hardware-implemented is due to S-box or sub-byte operation and that because it needs many resources and it is a non-linear structure. The proposed AES S-box ROM design considers the latest HEVC used for homeland security video surveillance systems. This paper presents different designs for VHDL efficient ROM implementation of AES S-box using IP core generator, ROM components, and using Functions, which are all supported by Xilinx. IP core generator has Block Memory Generator (BMG) component in its library. S-box IP core ROM is implemented using Single port block memory. The S-box lookup table has been used to fill the ROM using the .coe file format provided during the initialization of the IP core ROM. The width is set to 8-bit to address the 256 values while the depth is set to 8-bit which represents the data filed in the ROM. The whole design is synthesized using Xilinx ISE Design Suite 14.7 software, while Modelism (version10.4a) is used for the simulation process. The proposed IP core ROM design has shown better memory utilization compared to non-IP core ROM design, which is more suitable for memory-intensive applications. The proposed design is suitable for implementation using the FPGA ROM design. Hardware complexity, frequency, memory utilization, and delay are presented in this paper.
视频监控系统等广播应用正在使用高清(HD)视频。高分辨率视频的使用大大增加了视频编码标准的数据量,如高效视频编码(HEVC)和高级视频编码(AVC),这增加了存储、处理、加密和在不同通信信道上传输这些数据的挑战。视频压缩标准使用最先进的技术来更有效地压缩原始视频序列,这些技术要求较高的计算复杂度和内存利用率。随着HEVC和视频监控系统的兴起,出现了中间人攻击、未经授权泄露等安全隐患。这种风险可以通过加密HEVC的流量来减轻。目前使用最广泛的加密算法是高级加密标准AES (Advanced encryption Standard)。AES硬件实现中的大部分计算复杂性是由于S-box或子字节操作,这是因为它需要很多资源,而且它是一个非线性结构。提出的AES S-box ROM设计考虑了用于国土安全视频监控系统的最新HEVC。本文介绍了Xilinx支持的基于IP核生成器、ROM组件和使用函数实现AES S-box的VHDL高效ROM实现的不同设计。IP核生成器在其库中具有块内存生成器(BMG)组件。S-box IP核ROM采用单端口块存储器实现。S-box查找表已用于使用IP核心ROM初始化期间提供的.coe文件格式填充ROM。宽度设置为8位以解决256个值,而深度设置为8位,表示ROM中提交的数据。整个设计使用Xilinx ISE design Suite 14.7软件合成,而Modelism (version10.4a)用于模拟过程。与非IP核ROM设计相比,所提出的IP核ROM设计显示出更好的内存利用率,更适合内存密集型应用。所提出的设计适合使用FPGA ROM设计实现。本文给出了硬件复杂度、频率、内存利用率和延迟。
{"title":"Design and Simulation of AES S-Box Towards Data Security in Video Surveillance Using IP Core Generator","authors":"M. Hammad, W. Elmedany, Y. Ismail","doi":"10.1109/3ICT53449.2021.9581825","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581825","url":null,"abstract":"Broadcasting applications such as video surveillance systems are using High Definition (HD) videos. The use of high-resolution videos increases significantly the data volume of video coding standards such as High-Efficiency Video Coding (HEVC) and Advanced Video Coding (AVC), which increases the challenge for storing, processing, encrypting, and transmitting these data over different communication channels. Video compression standards use state-of-the-art techniques to compress raw video sequences more efficiently, such techniques require high computational complexity and memory utilization. With the emergent of using HEVC and video surveillance systems, many security risks arise such as man-in-the-middle attacks, and unauthorized disclosure. Such risks can be mitigated by encrypting the traffic of HEVC. The most widely used encryption algorithm is the Advanced Encryption Standard (AES). Most of the computational complexity in AES hardware-implemented is due to S-box or sub-byte operation and that because it needs many resources and it is a non-linear structure. The proposed AES S-box ROM design considers the latest HEVC used for homeland security video surveillance systems. This paper presents different designs for VHDL efficient ROM implementation of AES S-box using IP core generator, ROM components, and using Functions, which are all supported by Xilinx. IP core generator has Block Memory Generator (BMG) component in its library. S-box IP core ROM is implemented using Single port block memory. The S-box lookup table has been used to fill the ROM using the .coe file format provided during the initialization of the IP core ROM. The width is set to 8-bit to address the 256 values while the depth is set to 8-bit which represents the data filed in the ROM. The whole design is synthesized using Xilinx ISE Design Suite 14.7 software, while Modelism (version10.4a) is used for the simulation process. The proposed IP core ROM design has shown better memory utilization compared to non-IP core ROM design, which is more suitable for memory-intensive applications. The proposed design is suitable for implementation using the FPGA ROM design. Hardware complexity, frequency, memory utilization, and delay are presented in this paper.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134118733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Analytics, Greedy Approach, and Clustering Algorithms for Real-Time Cash Management of Automated Teller Machines 自动取款机实时现金管理的大数据分析、贪婪方法和聚类算法
Mohamed Almansoor, Y. Harrath
Automated Teller Machines (ATMs) often lack the required funds or become malfunctioned, which affects the customer experience and the reputation of the bank. Banks try to quickly resolve the problem through cash-in-transit companies that handle the operations of ATM refilling and maintenance. However, one of the largest dilemmas is to determine the order of visiting the ATMs as well as to balance the workload among the workforces during the day. In addition, there is a need to handle real-time and urgent requests during the day. This problem was modelled as a realtime multiple Travelling Salesmen Problem (mTSP). New constrains including traffic data, ATM priorities, and safety measurements were considered. We used big data analytics to extract useful features related to the customer withdrawal trends and active locations from real data provided by a Bahraini bank. To solve this NP-hard problem, we proposed a brute force method that generates optimal routes for limited-sized problem instances, up to 35 ATMs. Moreover, a greedy technique was proposed to solve large-sized instances considering one salesman. The obtained TSP route is then cut into clusters using unsupervised machine learning models. A modified version of k-Means has been applied with constrains to control the size of each cluster.
自动柜员机(atm)往往缺乏所需的资金或出现故障,这影响了客户的体验和银行的声誉。银行试图通过中转现金公司来快速解决这个问题,这些公司负责ATM机的充值和维护。然而,最大的难题之一是确定访问自动取款机的顺序以及在白天平衡工作人员之间的工作量。此外,还需要在白天处理实时和紧急的请求。该问题被建模为实时多旅行推销员问题(mTSP)。新的限制因素包括交通数据、ATM优先级和安全措施。我们使用大数据分析从巴林银行提供的真实数据中提取与客户提现趋势和活动地点相关的有用特征。为了解决这个np困难问题,我们提出了一种蛮力方法,该方法为有限大小的问题实例(最多35台atm)生成最优路由。在此基础上,提出了一种贪心算法来求解考虑一个销售人员的大型实例。然后使用无监督机器学习模型将获得的TSP路由切割成簇。一个修改版本的k-Means被应用于约束来控制每个集群的大小。
{"title":"Big Data Analytics, Greedy Approach, and Clustering Algorithms for Real-Time Cash Management of Automated Teller Machines","authors":"Mohamed Almansoor, Y. Harrath","doi":"10.1109/3ICT53449.2021.9581890","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581890","url":null,"abstract":"Automated Teller Machines (ATMs) often lack the required funds or become malfunctioned, which affects the customer experience and the reputation of the bank. Banks try to quickly resolve the problem through cash-in-transit companies that handle the operations of ATM refilling and maintenance. However, one of the largest dilemmas is to determine the order of visiting the ATMs as well as to balance the workload among the workforces during the day. In addition, there is a need to handle real-time and urgent requests during the day. This problem was modelled as a realtime multiple Travelling Salesmen Problem (mTSP). New constrains including traffic data, ATM priorities, and safety measurements were considered. We used big data analytics to extract useful features related to the customer withdrawal trends and active locations from real data provided by a Bahraini bank. To solve this NP-hard problem, we proposed a brute force method that generates optimal routes for limited-sized problem instances, up to 35 ATMs. Moreover, a greedy technique was proposed to solve large-sized instances considering one salesman. The obtained TSP route is then cut into clusters using unsupervised machine learning models. A modified version of k-Means has been applied with constrains to control the size of each cluster.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"551 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements VPN远程访问基于ospf的VPN安全漏洞及对策
Hanan Sawalmeh, Manar Malayshi, S. Ahmad, Ahmed Awad
Through the COVID-19 pandemic, the number of clients using Virtual Private Network (VPN) has dramatically increased. Consequently, VPN vulnerabilities have become target points to be exploited by attackers. However, studies have been released to defend against such attacks with the purpose of securing VPN. Nevertheless, attacks with high sophistication still target VPNs to comprise the critical data being communicated. VPN servers use protocols to secure connections with clients. However, these protocols are still targeted specifically with Denial-of-Service (DoS) attacks. This paper analyzes and treats the vulnerability of key negotiation process in the main mode as well as aggressive mode of Internet Key Exchange (IKE) protocol in IP Security (IPsec) VPN. We demonstrate experiments of a DoS attack based on Open Shortest Path First (OSPF) protocol adjacent route spoofing. Thereafter, we propose a method to tackle those attacks through exploiting the Suricata as an Intrusion Detection System (IDS) in defending the VPN against DoS attacks.
在新冠肺炎疫情期间,使用VPN (Virtual Private Network)的客户端数量急剧增加。因此,VPN漏洞成为攻击者利用的目标点。然而,为了保护VPN的安全,已经发布了一些研究来防御这种攻击。然而,高度复杂的攻击仍然以vpn为目标,以包含正在通信的关键数据。VPN服务器使用协议来保护与客户端的连接。然而,这些协议仍然是拒绝服务(DoS)攻击的专门目标。对IP安全(IPsec) VPN中Internet密钥交换(IKE)协议的主模式和攻击模式下密钥协商过程中的漏洞进行了分析和处理。我们演示了一种基于开放最短路径优先(OSPF)协议相邻路由欺骗的DoS攻击实验。因此,我们提出了一种利用Suricata作为入侵检测系统(IDS)来防御VPN的DoS攻击来解决这些攻击的方法。
{"title":"VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements","authors":"Hanan Sawalmeh, Manar Malayshi, S. Ahmad, Ahmed Awad","doi":"10.1109/3ICT53449.2021.9581512","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581512","url":null,"abstract":"Through the COVID-19 pandemic, the number of clients using Virtual Private Network (VPN) has dramatically increased. Consequently, VPN vulnerabilities have become target points to be exploited by attackers. However, studies have been released to defend against such attacks with the purpose of securing VPN. Nevertheless, attacks with high sophistication still target VPNs to comprise the critical data being communicated. VPN servers use protocols to secure connections with clients. However, these protocols are still targeted specifically with Denial-of-Service (DoS) attacks. This paper analyzes and treats the vulnerability of key negotiation process in the main mode as well as aggressive mode of Internet Key Exchange (IKE) protocol in IP Security (IPsec) VPN. We demonstrate experiments of a DoS attack based on Open Shortest Path First (OSPF) protocol adjacent route spoofing. Thereafter, we propose a method to tackle those attacks through exploiting the Suricata as an Intrusion Detection System (IDS) in defending the VPN against DoS attacks.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traffic Sign Recognition and Distance Estimation with YOLOv3 model 基于YOLOv3模型的交通标志识别与距离估计
Gokul S R Nath, Jashaswimalya Acharjee, S. Deb
Due to the expeditious increase in the number of vehicles, there is an increase in the number of road casualties even in a highly sophisticated roadway. This depicts the natural limitation of a human in maintaining Traffic rules. To avoid any lethal circumstance assistive driving vehicles are introduced which consists of systems that guide drivers in different Traffic situations. Traffic sign recognition systems play a crucial role in assistive driving vehicles these systems have been based on characteristics of the sign and two-state detectors due to accuracy and real-time factors systems on these bases are not used for real-time application. In this paper, we present a system that can recognize Traffic signs and their distance from the vehicle in non-ideal lighting as well as in varying climatic conditions. Our work proceeds with the implementation of YOLOv3(deep convolutional network based on end-to-end detection algorithm) used for Traffic sign recognition and segmentation. Training of the model is done with GTSRB dataset and achieves an accuracy of about 98.5% for the recognition task in different real-time scenarios. Furthermore, an efficient Heuristic-based approach has been deployed for estimating the distance between the Traffic sign and the monocular camera(placed in the vehicle) at every instance.
由于车辆数量的迅速增加,即使在高度复杂的道路上,道路伤亡人数也会增加。这描述了人类在维护交通规则方面的自然局限性。为了避免任何致命的情况,引入了辅助驾驶车辆,它包括在不同的交通情况下引导驾驶员的系统。交通标志识别系统在辅助驾驶车辆中起着至关重要的作用,这些系统基于标志的特性和双状态检测器,由于准确性和实时性的因素,这些基础上的系统并没有用于实时应用。在本文中,我们提出了一个系统,可以在非理想的照明和不同的气候条件下识别交通标志及其与车辆的距离。我们的工作是实现用于交通标志识别和分割的YOLOv3(基于端到端检测算法的深度卷积网络)。使用GTSRB数据集对模型进行训练,在不同的实时场景下,对识别任务的准确率达到了98.5%左右。此外,一种有效的基于启发式的方法被用于估计交通标志和单目摄像机(放置在车辆中)之间的距离。
{"title":"Traffic Sign Recognition and Distance Estimation with YOLOv3 model","authors":"Gokul S R Nath, Jashaswimalya Acharjee, S. Deb","doi":"10.1109/3ICT53449.2021.9581655","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581655","url":null,"abstract":"Due to the expeditious increase in the number of vehicles, there is an increase in the number of road casualties even in a highly sophisticated roadway. This depicts the natural limitation of a human in maintaining Traffic rules. To avoid any lethal circumstance assistive driving vehicles are introduced which consists of systems that guide drivers in different Traffic situations. Traffic sign recognition systems play a crucial role in assistive driving vehicles these systems have been based on characteristics of the sign and two-state detectors due to accuracy and real-time factors systems on these bases are not used for real-time application. In this paper, we present a system that can recognize Traffic signs and their distance from the vehicle in non-ideal lighting as well as in varying climatic conditions. Our work proceeds with the implementation of YOLOv3(deep convolutional network based on end-to-end detection algorithm) used for Traffic sign recognition and segmentation. Training of the model is done with GTSRB dataset and achieves an accuracy of about 98.5% for the recognition task in different real-time scenarios. Furthermore, an efficient Heuristic-based approach has been deployed for estimating the distance between the Traffic sign and the monocular camera(placed in the vehicle) at every instance.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Principal Components-Artificial Neural Network in Functional Near-Infrared Spectroscopy (fNIRS) for Brain Control Interface 脑控接口功能近红外光谱(fNIRS)中的主成分-人工神经网络
Jia Heng Ong, K. Chia
Functional near-infrared spectroscopy (fNIRS) is a non-invasive brain imaging technology that is widely utilized in Brain Control Interface (BCI) applications. Feature extraction is crucial to remove unwanted signals and improve the accuracy of a machine learning algorithm in BCI. Despite principal component analysis (PCA) is a popular feature extraction method in near-infrared spectroscopy, PCA is rarely studied in fNIRS. Thus, this study compared fNIRS-based BCI models that used PCA and that used statistical features in BCI for four mental activities classification. First, PCA was applied to transform pre-processed fNIRS signals into few principal components that were the inputs of artificial neural network (ANN) to form PCs-ANN. Three different combinations of fNIRS signals were used to study the performance of PCs-ANN using 10-fold cross-validation. The best PCs-ANN was compared with ANN that used statistical-based features. The finding shows that PCs-ANN outperformed ANN that used statistical-based features in the BCI classification application.
功能近红外光谱(fNIRS)是一种非侵入性脑成像技术,广泛应用于脑控制接口(BCI)。在脑机接口中,特征提取对于去除无用信号和提高机器学习算法的准确性至关重要。尽管主成分分析是近红外光谱中常用的特征提取方法,但在近红外光谱中对主成分分析的研究却很少。因此,本研究比较了基于fnir的脑机接口模型中使用PCA和使用脑机接口统计特征的四种心理活动分类。首先,利用主成分分析法(PCA)将预处理后的fNIRS信号转化为几个主成分,作为人工神经网络(ANN)的输入,形成PCs-ANN;使用三种不同的fNIRS信号组合,通过10倍交叉验证研究PCs-ANN的性能。将PCs-ANN与基于统计特征的ANN进行比较。研究结果表明,pc -ANN在脑机接口分类应用中优于使用基于统计特征的ANN。
{"title":"Principal Components-Artificial Neural Network in Functional Near-Infrared Spectroscopy (fNIRS) for Brain Control Interface","authors":"Jia Heng Ong, K. Chia","doi":"10.1109/3ICT53449.2021.9581861","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581861","url":null,"abstract":"Functional near-infrared spectroscopy (fNIRS) is a non-invasive brain imaging technology that is widely utilized in Brain Control Interface (BCI) applications. Feature extraction is crucial to remove unwanted signals and improve the accuracy of a machine learning algorithm in BCI. Despite principal component analysis (PCA) is a popular feature extraction method in near-infrared spectroscopy, PCA is rarely studied in fNIRS. Thus, this study compared fNIRS-based BCI models that used PCA and that used statistical features in BCI for four mental activities classification. First, PCA was applied to transform pre-processed fNIRS signals into few principal components that were the inputs of artificial neural network (ANN) to form PCs-ANN. Three different combinations of fNIRS signals were used to study the performance of PCs-ANN using 10-fold cross-validation. The best PCs-ANN was compared with ANN that used statistical-based features. The finding shows that PCs-ANN outperformed ANN that used statistical-based features in the BCI classification application.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130894213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Cost-Sensitive Convolutional Neural Network for Network Traffic Classification 网络流量分类中一种有效的代价敏感卷积神经网络
M. S. Sharif, Mina Moein
The volume, and density of computer network traffic are increasing dramatically with the technology advancements, which has led to the emergence of various new protocols. Analyzing the huge data in large business networks has become important for the owners of those networks. As the majority of the developed applications need to guarantee the network services, while some traditional applications may work well enough without a specific service level. Therefore, the performance requirements of future internet traffic will increase to a higher level. Increasing pressure on the performance of computer networks requires addressing several issues, such as maintaining the scalability of new service architectures, establishing control protocols for routing, and distributing information to identified traffic streams. The main concern is flow detection and traffic detection mechanisms to help establish traffic control policies. A cost-sensitive deep learning approach for encrypted traffic classification has been proposed in this research, to confront the effect of the class imbalance problem on the low-frequency traffic data detection. The developed model can attain a high level of performance, particularly for low-frequency traffic data. It outperformed the other traffic classification methods.
随着技术的进步,计算机网络流量的数量和密度急剧增加,这导致了各种新协议的出现。分析大型商业网络中的海量数据对于网络所有者来说已经变得非常重要。由于大多数开发的应用程序都需要保证网络服务,而一些传统应用程序在没有特定服务级别的情况下也可以很好地工作。因此,未来互联网流量的性能要求将会提高到更高的水平。对计算机网络性能的压力越来越大,需要解决几个问题,例如维护新服务体系结构的可伸缩性,建立路由控制协议,以及将信息分发到已识别的流量流。主要关注的是流量检测和流量检测机制,以帮助建立流量控制策略。针对类不平衡问题对低频流量数据检测的影响,本文提出了一种代价敏感的加密流量分类深度学习方法。所开发的模型可以获得高水平的性能,特别是对于低频流量数据。该方法优于其他流量分类方法。
{"title":"An Effective Cost-Sensitive Convolutional Neural Network for Network Traffic Classification","authors":"M. S. Sharif, Mina Moein","doi":"10.1109/3ICT53449.2021.9581789","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581789","url":null,"abstract":"The volume, and density of computer network traffic are increasing dramatically with the technology advancements, which has led to the emergence of various new protocols. Analyzing the huge data in large business networks has become important for the owners of those networks. As the majority of the developed applications need to guarantee the network services, while some traditional applications may work well enough without a specific service level. Therefore, the performance requirements of future internet traffic will increase to a higher level. Increasing pressure on the performance of computer networks requires addressing several issues, such as maintaining the scalability of new service architectures, establishing control protocols for routing, and distributing information to identified traffic streams. The main concern is flow detection and traffic detection mechanisms to help establish traffic control policies. A cost-sensitive deep learning approach for encrypted traffic classification has been proposed in this research, to confront the effect of the class imbalance problem on the low-frequency traffic data detection. The developed model can attain a high level of performance, particularly for low-frequency traffic data. It outperformed the other traffic classification methods.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Oil Spill Detection System in the Arabian Gulf Region: An Azure Machine-Learning Approach 阿拉伯海湾地区溢油检测系统:Azure机器学习方法
Shaima Almeer, Fatema A. Albalooshi, Aysha Alhajeri
Locating oil spills is a crucial portion of an effective marine contamination administration. In this paper, we address the issue of oil spillage location exposure within the Arabian Gulf region, by leveraging a Machine-Learning (ML) workflow on a cloud-based computing platform: Microsoft Azure Machine-Learning Service (Custom Vision). Our workflow comprises of virtual machine, database, and four modules (Information Collection Module, Discovery Show, Application Module, and a Choice Module). The adequacy of the proposed workflow is assessed on Synthetic Aperture Radar (SAR) imagery of the targeted region. Qualitative and quantitative analysis show that the purposed algorithm can detect oil spill occurrence with an accuracy of 90.5%.
定位溢油是有效的海洋污染管理的关键部分。在本文中,我们通过利用基于云计算平台的机器学习(ML)工作流程:Microsoft Azure机器学习服务(自定义视觉),解决了阿拉伯海湾地区石油泄漏位置暴露的问题。我们的工作流程包括虚拟机、数据库和四个模块(信息收集模块、发现展示模块、应用模块和选择模块)。在目标区域的合成孔径雷达(SAR)图像上评估了所提出工作流的充分性。定性和定量分析表明,该算法检测溢油事件的准确率为90.5%。
{"title":"Oil Spill Detection System in the Arabian Gulf Region: An Azure Machine-Learning Approach","authors":"Shaima Almeer, Fatema A. Albalooshi, Aysha Alhajeri","doi":"10.1109/3ICT53449.2021.9581841","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581841","url":null,"abstract":"Locating oil spills is a crucial portion of an effective marine contamination administration. In this paper, we address the issue of oil spillage location exposure within the Arabian Gulf region, by leveraging a Machine-Learning (ML) workflow on a cloud-based computing platform: Microsoft Azure Machine-Learning Service (Custom Vision). Our workflow comprises of virtual machine, database, and four modules (Information Collection Module, Discovery Show, Application Module, and a Choice Module). The adequacy of the proposed workflow is assessed on Synthetic Aperture Radar (SAR) imagery of the targeted region. Qualitative and quantitative analysis show that the purposed algorithm can detect oil spill occurrence with an accuracy of 90.5%.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115240339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness of Online Teaching during COVID-19 新冠肺炎疫情期间在线教学效果分析
Farheen Akram, Muhammad Abrar ul Haq, H. Malik, Nadeem Mahmood
While considering the challenges of online teaching in the current scenario of Covid-19 pandemic, the current study aimed to analyze the effect of student participation, teachers' skills and strategies, teacher training, teaching domain and teaching perception on effectiveness of online teaching. Primary data was used to test the proposed model of the study, data was collected through emails using convenience sampling from university teachers of Pakistan. Structural equation modelling technique was used through SmartPLS (v.3.3.3) to analyze the model of this research. Findings of the current study indicate that student participation, teachers' skills and strategies, teacher's training, teaching domain and teaching perception have a significant positive effect on effectiveness of online teaching. Hence, this study recommends that universities must have to focus on the individual teachers' need to make online teaching more effective.
考虑到新冠肺炎疫情下在线教学面临的挑战,本研究旨在分析学生参与、教师技能和策略、教师培训、教学领域和教学感知对在线教学有效性的影响。原始数据用于检验本研究提出的模型,数据通过电子邮件收集,使用方便抽样从巴基斯坦的大学教师中收集。采用结构方程建模技术,通过SmartPLS (v.3.3.3)对本研究模型进行分析。本研究结果表明,学生参与、教师技能与策略、教师培训、教学领域和教学感知对网络教学的有效性有显著的正向影响。因此,本研究建议大学必须关注个别教师的需求,以使在线教学更有效。
{"title":"Effectiveness of Online Teaching during COVID-19","authors":"Farheen Akram, Muhammad Abrar ul Haq, H. Malik, Nadeem Mahmood","doi":"10.1109/3ICT53449.2021.9582144","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582144","url":null,"abstract":"While considering the challenges of online teaching in the current scenario of Covid-19 pandemic, the current study aimed to analyze the effect of student participation, teachers' skills and strategies, teacher training, teaching domain and teaching perception on effectiveness of online teaching. Primary data was used to test the proposed model of the study, data was collected through emails using convenience sampling from university teachers of Pakistan. Structural equation modelling technique was used through SmartPLS (v.3.3.3) to analyze the model of this research. Findings of the current study indicate that student participation, teachers' skills and strategies, teacher's training, teaching domain and teaching perception have a significant positive effect on effectiveness of online teaching. Hence, this study recommends that universities must have to focus on the individual teachers' need to make online teaching more effective.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123619786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FitNet: A deep neural network driven architecture for real time posture rectification FitNet:用于实时姿态校正的深度神经网络驱动架构
Debosmit Neogi, Nataraj Das, S. Deb
A methodology of real time pose estimation, which is believed to mitigate many orthopaedic adversaries pertaining to wrong posture, has been illustrated in this paper. Vast array of problems get reported that are known to arise due to maintaining a wrong posture during exercising or performing yoga, for a prolonged period of time. Several developments were made with regard to this issue, yet a major drawback was the presumption that a person during exercising or performing yoga or any kind of gym sessions, will keep the camera facing only at a fixed pre-determined portrayal direction. The approach, towards this problem, mainly deals with precise ROI detection, correct identification of human body joints and tracking down the motion of the body, all in real time. A major step towards converging to the solution is determining the angular separation between the joints and comparing them with the ones desired. Another important facet of the stated methodology is analysis of performance of the deep neural architecture in different camera positions. This is a major bottleneck for many different models that are intended to track posture of a person in real time. All these operations are done efficiently, with an appropriate trade-off between time complexity and performance metrics. At the end a robust feedback based support system has been obtained, that performs significantly better than the state of the art algorithm due to the precise transformation of input color space, contributing significantly in the field of orthopaedics by providing a feasible solution to avoid body strain and unnecessary pressure on joints during exercise.
本文介绍了一种实时姿态估计方法,该方法被认为可以减轻许多与错误姿态有关的骨科对手。据报道,由于在锻炼或做瑜伽时长时间保持错误的姿势,会产生大量的问题。关于这个问题有了一些发展,但一个主要的缺点是假设一个人在锻炼或做瑜伽或任何类型的健身课程时,将使相机只面向固定的预先确定的写照方向。针对这一问题,该方法主要涉及精确的ROI检测,正确识别人体关节,实时跟踪人体运动。收敛到解决方案的一个主要步骤是确定关节之间的角分离,并将它们与期望的关节进行比较。所述方法的另一个重要方面是分析深度神经结构在不同摄像机位置的性能。这是许多用于实时跟踪人的姿势的不同模型的主要瓶颈。所有这些操作都是有效地完成的,在时间复杂性和性能指标之间进行了适当的权衡。最后得到了一个基于鲁棒反馈的支持系统,由于输入颜色空间的精确变换,该系统的性能明显优于目前的算法,为避免运动时身体紧张和关节不必要的压力提供了可行的解决方案,在骨科领域做出了重大贡献。
{"title":"FitNet: A deep neural network driven architecture for real time posture rectification","authors":"Debosmit Neogi, Nataraj Das, S. Deb","doi":"10.1109/3ICT53449.2021.9582113","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582113","url":null,"abstract":"A methodology of real time pose estimation, which is believed to mitigate many orthopaedic adversaries pertaining to wrong posture, has been illustrated in this paper. Vast array of problems get reported that are known to arise due to maintaining a wrong posture during exercising or performing yoga, for a prolonged period of time. Several developments were made with regard to this issue, yet a major drawback was the presumption that a person during exercising or performing yoga or any kind of gym sessions, will keep the camera facing only at a fixed pre-determined portrayal direction. The approach, towards this problem, mainly deals with precise ROI detection, correct identification of human body joints and tracking down the motion of the body, all in real time. A major step towards converging to the solution is determining the angular separation between the joints and comparing them with the ones desired. Another important facet of the stated methodology is analysis of performance of the deep neural architecture in different camera positions. This is a major bottleneck for many different models that are intended to track posture of a person in real time. All these operations are done efficiently, with an appropriate trade-off between time complexity and performance metrics. At the end a robust feedback based support system has been obtained, that performs significantly better than the state of the art algorithm due to the precise transformation of input color space, contributing significantly in the field of orthopaedics by providing a feasible solution to avoid body strain and unnecessary pressure on joints during exercise.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125374700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Intensity Estimation Application Based on Website Microservice Logs 基于网站微服务日志的强度估计应用
A. Müngen, Iclal Cetin Tas
The number of digital platforms that use cloud systems with microsystem architectures has increased day by day. By using public cloud systems efficiently, costs and expenses can be significantly reduced. This study tries to determine the necessary resource for the website by examining user activities for cloud resources management. A successful estimating system is essential for adjusting the price/performance balance of resource management. In this study, more than 1.5 million user logs with 18 different features were collected. SVM RBF and decision tree forest have been applied for this data. This study is shown that the SVM RBF method modeled the service rush time with an approximately 95% success rate. With the study, it has been revealed that a sound cloud resources management system can a significant economic benefit by adjusting the number of resources according to rush time prediction.
使用带有微系统架构的云系统的数字平台数量日益增加。通过有效地使用公共云系统,可以大大降低成本和费用。本研究试图通过检查云资源管理的用户活动来确定网站所需的资源。一个成功的估算系统对于调整资源管理的价格/绩效平衡至关重要。在这项研究中,收集了超过150万个用户日志,其中包含18个不同的功能。对该数据采用了支持向量机RBF和决策树森林方法。研究表明,SVM RBF方法对服务高峰时间建模的成功率约为95%。通过研究发现,一个完善的云资源管理系统可以根据高峰时间预测调整资源数量,从而获得显著的经济效益。
{"title":"An Intensity Estimation Application Based on Website Microservice Logs","authors":"A. Müngen, Iclal Cetin Tas","doi":"10.1109/3ICT53449.2021.9582107","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582107","url":null,"abstract":"The number of digital platforms that use cloud systems with microsystem architectures has increased day by day. By using public cloud systems efficiently, costs and expenses can be significantly reduced. This study tries to determine the necessary resource for the website by examining user activities for cloud resources management. A successful estimating system is essential for adjusting the price/performance balance of resource management. In this study, more than 1.5 million user logs with 18 different features were collected. SVM RBF and decision tree forest have been applied for this data. This study is shown that the SVM RBF method modeled the service rush time with an approximately 95% success rate. With the study, it has been revealed that a sound cloud resources management system can a significant economic benefit by adjusting the number of resources according to rush time prediction.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117107895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1