首页 > 最新文献

2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)最新文献

英文 中文
Design and Simulation of AES S-Box Towards Data Security in Video Surveillance Using IP Core Generator 利用IP核发生器实现视频监控数据安全的AES S-Box设计与仿真
M. Hammad, W. Elmedany, Y. Ismail
Broadcasting applications such as video surveillance systems are using High Definition (HD) videos. The use of high-resolution videos increases significantly the data volume of video coding standards such as High-Efficiency Video Coding (HEVC) and Advanced Video Coding (AVC), which increases the challenge for storing, processing, encrypting, and transmitting these data over different communication channels. Video compression standards use state-of-the-art techniques to compress raw video sequences more efficiently, such techniques require high computational complexity and memory utilization. With the emergent of using HEVC and video surveillance systems, many security risks arise such as man-in-the-middle attacks, and unauthorized disclosure. Such risks can be mitigated by encrypting the traffic of HEVC. The most widely used encryption algorithm is the Advanced Encryption Standard (AES). Most of the computational complexity in AES hardware-implemented is due to S-box or sub-byte operation and that because it needs many resources and it is a non-linear structure. The proposed AES S-box ROM design considers the latest HEVC used for homeland security video surveillance systems. This paper presents different designs for VHDL efficient ROM implementation of AES S-box using IP core generator, ROM components, and using Functions, which are all supported by Xilinx. IP core generator has Block Memory Generator (BMG) component in its library. S-box IP core ROM is implemented using Single port block memory. The S-box lookup table has been used to fill the ROM using the .coe file format provided during the initialization of the IP core ROM. The width is set to 8-bit to address the 256 values while the depth is set to 8-bit which represents the data filed in the ROM. The whole design is synthesized using Xilinx ISE Design Suite 14.7 software, while Modelism (version10.4a) is used for the simulation process. The proposed IP core ROM design has shown better memory utilization compared to non-IP core ROM design, which is more suitable for memory-intensive applications. The proposed design is suitable for implementation using the FPGA ROM design. Hardware complexity, frequency, memory utilization, and delay are presented in this paper.
视频监控系统等广播应用正在使用高清(HD)视频。高分辨率视频的使用大大增加了视频编码标准的数据量,如高效视频编码(HEVC)和高级视频编码(AVC),这增加了存储、处理、加密和在不同通信信道上传输这些数据的挑战。视频压缩标准使用最先进的技术来更有效地压缩原始视频序列,这些技术要求较高的计算复杂度和内存利用率。随着HEVC和视频监控系统的兴起,出现了中间人攻击、未经授权泄露等安全隐患。这种风险可以通过加密HEVC的流量来减轻。目前使用最广泛的加密算法是高级加密标准AES (Advanced encryption Standard)。AES硬件实现中的大部分计算复杂性是由于S-box或子字节操作,这是因为它需要很多资源,而且它是一个非线性结构。提出的AES S-box ROM设计考虑了用于国土安全视频监控系统的最新HEVC。本文介绍了Xilinx支持的基于IP核生成器、ROM组件和使用函数实现AES S-box的VHDL高效ROM实现的不同设计。IP核生成器在其库中具有块内存生成器(BMG)组件。S-box IP核ROM采用单端口块存储器实现。S-box查找表已用于使用IP核心ROM初始化期间提供的.coe文件格式填充ROM。宽度设置为8位以解决256个值,而深度设置为8位,表示ROM中提交的数据。整个设计使用Xilinx ISE design Suite 14.7软件合成,而Modelism (version10.4a)用于模拟过程。与非IP核ROM设计相比,所提出的IP核ROM设计显示出更好的内存利用率,更适合内存密集型应用。所提出的设计适合使用FPGA ROM设计实现。本文给出了硬件复杂度、频率、内存利用率和延迟。
{"title":"Design and Simulation of AES S-Box Towards Data Security in Video Surveillance Using IP Core Generator","authors":"M. Hammad, W. Elmedany, Y. Ismail","doi":"10.1109/3ICT53449.2021.9581825","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581825","url":null,"abstract":"Broadcasting applications such as video surveillance systems are using High Definition (HD) videos. The use of high-resolution videos increases significantly the data volume of video coding standards such as High-Efficiency Video Coding (HEVC) and Advanced Video Coding (AVC), which increases the challenge for storing, processing, encrypting, and transmitting these data over different communication channels. Video compression standards use state-of-the-art techniques to compress raw video sequences more efficiently, such techniques require high computational complexity and memory utilization. With the emergent of using HEVC and video surveillance systems, many security risks arise such as man-in-the-middle attacks, and unauthorized disclosure. Such risks can be mitigated by encrypting the traffic of HEVC. The most widely used encryption algorithm is the Advanced Encryption Standard (AES). Most of the computational complexity in AES hardware-implemented is due to S-box or sub-byte operation and that because it needs many resources and it is a non-linear structure. The proposed AES S-box ROM design considers the latest HEVC used for homeland security video surveillance systems. This paper presents different designs for VHDL efficient ROM implementation of AES S-box using IP core generator, ROM components, and using Functions, which are all supported by Xilinx. IP core generator has Block Memory Generator (BMG) component in its library. S-box IP core ROM is implemented using Single port block memory. The S-box lookup table has been used to fill the ROM using the .coe file format provided during the initialization of the IP core ROM. The width is set to 8-bit to address the 256 values while the depth is set to 8-bit which represents the data filed in the ROM. The whole design is synthesized using Xilinx ISE Design Suite 14.7 software, while Modelism (version10.4a) is used for the simulation process. The proposed IP core ROM design has shown better memory utilization compared to non-IP core ROM design, which is more suitable for memory-intensive applications. The proposed design is suitable for implementation using the FPGA ROM design. Hardware complexity, frequency, memory utilization, and delay are presented in this paper.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134118733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Analytics, Greedy Approach, and Clustering Algorithms for Real-Time Cash Management of Automated Teller Machines 自动取款机实时现金管理的大数据分析、贪婪方法和聚类算法
Mohamed Almansoor, Y. Harrath
Automated Teller Machines (ATMs) often lack the required funds or become malfunctioned, which affects the customer experience and the reputation of the bank. Banks try to quickly resolve the problem through cash-in-transit companies that handle the operations of ATM refilling and maintenance. However, one of the largest dilemmas is to determine the order of visiting the ATMs as well as to balance the workload among the workforces during the day. In addition, there is a need to handle real-time and urgent requests during the day. This problem was modelled as a realtime multiple Travelling Salesmen Problem (mTSP). New constrains including traffic data, ATM priorities, and safety measurements were considered. We used big data analytics to extract useful features related to the customer withdrawal trends and active locations from real data provided by a Bahraini bank. To solve this NP-hard problem, we proposed a brute force method that generates optimal routes for limited-sized problem instances, up to 35 ATMs. Moreover, a greedy technique was proposed to solve large-sized instances considering one salesman. The obtained TSP route is then cut into clusters using unsupervised machine learning models. A modified version of k-Means has been applied with constrains to control the size of each cluster.
自动柜员机(atm)往往缺乏所需的资金或出现故障,这影响了客户的体验和银行的声誉。银行试图通过中转现金公司来快速解决这个问题,这些公司负责ATM机的充值和维护。然而,最大的难题之一是确定访问自动取款机的顺序以及在白天平衡工作人员之间的工作量。此外,还需要在白天处理实时和紧急的请求。该问题被建模为实时多旅行推销员问题(mTSP)。新的限制因素包括交通数据、ATM优先级和安全措施。我们使用大数据分析从巴林银行提供的真实数据中提取与客户提现趋势和活动地点相关的有用特征。为了解决这个np困难问题,我们提出了一种蛮力方法,该方法为有限大小的问题实例(最多35台atm)生成最优路由。在此基础上,提出了一种贪心算法来求解考虑一个销售人员的大型实例。然后使用无监督机器学习模型将获得的TSP路由切割成簇。一个修改版本的k-Means被应用于约束来控制每个集群的大小。
{"title":"Big Data Analytics, Greedy Approach, and Clustering Algorithms for Real-Time Cash Management of Automated Teller Machines","authors":"Mohamed Almansoor, Y. Harrath","doi":"10.1109/3ICT53449.2021.9581890","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581890","url":null,"abstract":"Automated Teller Machines (ATMs) often lack the required funds or become malfunctioned, which affects the customer experience and the reputation of the bank. Banks try to quickly resolve the problem through cash-in-transit companies that handle the operations of ATM refilling and maintenance. However, one of the largest dilemmas is to determine the order of visiting the ATMs as well as to balance the workload among the workforces during the day. In addition, there is a need to handle real-time and urgent requests during the day. This problem was modelled as a realtime multiple Travelling Salesmen Problem (mTSP). New constrains including traffic data, ATM priorities, and safety measurements were considered. We used big data analytics to extract useful features related to the customer withdrawal trends and active locations from real data provided by a Bahraini bank. To solve this NP-hard problem, we proposed a brute force method that generates optimal routes for limited-sized problem instances, up to 35 ATMs. Moreover, a greedy technique was proposed to solve large-sized instances considering one salesman. The obtained TSP route is then cut into clusters using unsupervised machine learning models. A modified version of k-Means has been applied with constrains to control the size of each cluster.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"551 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements VPN远程访问基于ospf的VPN安全漏洞及对策
Hanan Sawalmeh, Manar Malayshi, S. Ahmad, Ahmed Awad
Through the COVID-19 pandemic, the number of clients using Virtual Private Network (VPN) has dramatically increased. Consequently, VPN vulnerabilities have become target points to be exploited by attackers. However, studies have been released to defend against such attacks with the purpose of securing VPN. Nevertheless, attacks with high sophistication still target VPNs to comprise the critical data being communicated. VPN servers use protocols to secure connections with clients. However, these protocols are still targeted specifically with Denial-of-Service (DoS) attacks. This paper analyzes and treats the vulnerability of key negotiation process in the main mode as well as aggressive mode of Internet Key Exchange (IKE) protocol in IP Security (IPsec) VPN. We demonstrate experiments of a DoS attack based on Open Shortest Path First (OSPF) protocol adjacent route spoofing. Thereafter, we propose a method to tackle those attacks through exploiting the Suricata as an Intrusion Detection System (IDS) in defending the VPN against DoS attacks.
在新冠肺炎疫情期间,使用VPN (Virtual Private Network)的客户端数量急剧增加。因此,VPN漏洞成为攻击者利用的目标点。然而,为了保护VPN的安全,已经发布了一些研究来防御这种攻击。然而,高度复杂的攻击仍然以vpn为目标,以包含正在通信的关键数据。VPN服务器使用协议来保护与客户端的连接。然而,这些协议仍然是拒绝服务(DoS)攻击的专门目标。对IP安全(IPsec) VPN中Internet密钥交换(IKE)协议的主模式和攻击模式下密钥协商过程中的漏洞进行了分析和处理。我们演示了一种基于开放最短路径优先(OSPF)协议相邻路由欺骗的DoS攻击实验。因此,我们提出了一种利用Suricata作为入侵检测系统(IDS)来防御VPN的DoS攻击来解决这些攻击的方法。
{"title":"VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements","authors":"Hanan Sawalmeh, Manar Malayshi, S. Ahmad, Ahmed Awad","doi":"10.1109/3ICT53449.2021.9581512","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581512","url":null,"abstract":"Through the COVID-19 pandemic, the number of clients using Virtual Private Network (VPN) has dramatically increased. Consequently, VPN vulnerabilities have become target points to be exploited by attackers. However, studies have been released to defend against such attacks with the purpose of securing VPN. Nevertheless, attacks with high sophistication still target VPNs to comprise the critical data being communicated. VPN servers use protocols to secure connections with clients. However, these protocols are still targeted specifically with Denial-of-Service (DoS) attacks. This paper analyzes and treats the vulnerability of key negotiation process in the main mode as well as aggressive mode of Internet Key Exchange (IKE) protocol in IP Security (IPsec) VPN. We demonstrate experiments of a DoS attack based on Open Shortest Path First (OSPF) protocol adjacent route spoofing. Thereafter, we propose a method to tackle those attacks through exploiting the Suricata as an Intrusion Detection System (IDS) in defending the VPN against DoS attacks.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traffic Sign Recognition and Distance Estimation with YOLOv3 model 基于YOLOv3模型的交通标志识别与距离估计
Gokul S R Nath, Jashaswimalya Acharjee, S. Deb
Due to the expeditious increase in the number of vehicles, there is an increase in the number of road casualties even in a highly sophisticated roadway. This depicts the natural limitation of a human in maintaining Traffic rules. To avoid any lethal circumstance assistive driving vehicles are introduced which consists of systems that guide drivers in different Traffic situations. Traffic sign recognition systems play a crucial role in assistive driving vehicles these systems have been based on characteristics of the sign and two-state detectors due to accuracy and real-time factors systems on these bases are not used for real-time application. In this paper, we present a system that can recognize Traffic signs and their distance from the vehicle in non-ideal lighting as well as in varying climatic conditions. Our work proceeds with the implementation of YOLOv3(deep convolutional network based on end-to-end detection algorithm) used for Traffic sign recognition and segmentation. Training of the model is done with GTSRB dataset and achieves an accuracy of about 98.5% for the recognition task in different real-time scenarios. Furthermore, an efficient Heuristic-based approach has been deployed for estimating the distance between the Traffic sign and the monocular camera(placed in the vehicle) at every instance.
由于车辆数量的迅速增加,即使在高度复杂的道路上,道路伤亡人数也会增加。这描述了人类在维护交通规则方面的自然局限性。为了避免任何致命的情况,引入了辅助驾驶车辆,它包括在不同的交通情况下引导驾驶员的系统。交通标志识别系统在辅助驾驶车辆中起着至关重要的作用,这些系统基于标志的特性和双状态检测器,由于准确性和实时性的因素,这些基础上的系统并没有用于实时应用。在本文中,我们提出了一个系统,可以在非理想的照明和不同的气候条件下识别交通标志及其与车辆的距离。我们的工作是实现用于交通标志识别和分割的YOLOv3(基于端到端检测算法的深度卷积网络)。使用GTSRB数据集对模型进行训练,在不同的实时场景下,对识别任务的准确率达到了98.5%左右。此外,一种有效的基于启发式的方法被用于估计交通标志和单目摄像机(放置在车辆中)之间的距离。
{"title":"Traffic Sign Recognition and Distance Estimation with YOLOv3 model","authors":"Gokul S R Nath, Jashaswimalya Acharjee, S. Deb","doi":"10.1109/3ICT53449.2021.9581655","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581655","url":null,"abstract":"Due to the expeditious increase in the number of vehicles, there is an increase in the number of road casualties even in a highly sophisticated roadway. This depicts the natural limitation of a human in maintaining Traffic rules. To avoid any lethal circumstance assistive driving vehicles are introduced which consists of systems that guide drivers in different Traffic situations. Traffic sign recognition systems play a crucial role in assistive driving vehicles these systems have been based on characteristics of the sign and two-state detectors due to accuracy and real-time factors systems on these bases are not used for real-time application. In this paper, we present a system that can recognize Traffic signs and their distance from the vehicle in non-ideal lighting as well as in varying climatic conditions. Our work proceeds with the implementation of YOLOv3(deep convolutional network based on end-to-end detection algorithm) used for Traffic sign recognition and segmentation. Training of the model is done with GTSRB dataset and achieves an accuracy of about 98.5% for the recognition task in different real-time scenarios. Furthermore, an efficient Heuristic-based approach has been deployed for estimating the distance between the Traffic sign and the monocular camera(placed in the vehicle) at every instance.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Principal Components-Artificial Neural Network in Functional Near-Infrared Spectroscopy (fNIRS) for Brain Control Interface 脑控接口功能近红外光谱(fNIRS)中的主成分-人工神经网络
Jia Heng Ong, K. Chia
Functional near-infrared spectroscopy (fNIRS) is a non-invasive brain imaging technology that is widely utilized in Brain Control Interface (BCI) applications. Feature extraction is crucial to remove unwanted signals and improve the accuracy of a machine learning algorithm in BCI. Despite principal component analysis (PCA) is a popular feature extraction method in near-infrared spectroscopy, PCA is rarely studied in fNIRS. Thus, this study compared fNIRS-based BCI models that used PCA and that used statistical features in BCI for four mental activities classification. First, PCA was applied to transform pre-processed fNIRS signals into few principal components that were the inputs of artificial neural network (ANN) to form PCs-ANN. Three different combinations of fNIRS signals were used to study the performance of PCs-ANN using 10-fold cross-validation. The best PCs-ANN was compared with ANN that used statistical-based features. The finding shows that PCs-ANN outperformed ANN that used statistical-based features in the BCI classification application.
功能近红外光谱(fNIRS)是一种非侵入性脑成像技术,广泛应用于脑控制接口(BCI)。在脑机接口中,特征提取对于去除无用信号和提高机器学习算法的准确性至关重要。尽管主成分分析是近红外光谱中常用的特征提取方法,但在近红外光谱中对主成分分析的研究却很少。因此,本研究比较了基于fnir的脑机接口模型中使用PCA和使用脑机接口统计特征的四种心理活动分类。首先,利用主成分分析法(PCA)将预处理后的fNIRS信号转化为几个主成分,作为人工神经网络(ANN)的输入,形成PCs-ANN;使用三种不同的fNIRS信号组合,通过10倍交叉验证研究PCs-ANN的性能。将PCs-ANN与基于统计特征的ANN进行比较。研究结果表明,pc -ANN在脑机接口分类应用中优于使用基于统计特征的ANN。
{"title":"Principal Components-Artificial Neural Network in Functional Near-Infrared Spectroscopy (fNIRS) for Brain Control Interface","authors":"Jia Heng Ong, K. Chia","doi":"10.1109/3ICT53449.2021.9581861","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581861","url":null,"abstract":"Functional near-infrared spectroscopy (fNIRS) is a non-invasive brain imaging technology that is widely utilized in Brain Control Interface (BCI) applications. Feature extraction is crucial to remove unwanted signals and improve the accuracy of a machine learning algorithm in BCI. Despite principal component analysis (PCA) is a popular feature extraction method in near-infrared spectroscopy, PCA is rarely studied in fNIRS. Thus, this study compared fNIRS-based BCI models that used PCA and that used statistical features in BCI for four mental activities classification. First, PCA was applied to transform pre-processed fNIRS signals into few principal components that were the inputs of artificial neural network (ANN) to form PCs-ANN. Three different combinations of fNIRS signals were used to study the performance of PCs-ANN using 10-fold cross-validation. The best PCs-ANN was compared with ANN that used statistical-based features. The finding shows that PCs-ANN outperformed ANN that used statistical-based features in the BCI classification application.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130894213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Composer 人工智能作曲家
Muammer Catak, Sarah AlRasheedi, Norah AlAli, Ghadeer AlQallaf, Malak AlMeri, Bibi Ali
In this study, classical music has been investigated mainly based on pieces of well-known composers Mozart and Beethoven, then AI composer based on Markov chains and RNN has been proposed. AI is an efficient tool in science and technology for many specific applications including music field. The database has been collected based on 25 classical music sheets. The notes were separated in two groups where they are right hand and left hand. The database includes the notes and their frequencies and durations. The transition probability of each note were calculated. After the selection of the first note randomly, then the following notes were generated by means of the transition matrix. According to the results, both methods show an adequate level of quality considering the generation of notes by means of AI composer. The authors recommend to use Markov chains if a simple but efficient tool is appropriate considering the design criteria.
本研究主要基于著名作曲家莫扎特和贝多芬的作品对古典音乐进行研究,然后提出了基于马尔可夫链和RNN的人工智能作曲家。人工智能是包括音乐领域在内的许多特定应用领域的有效科学技术工具。该数据库是根据25张古典乐谱收集的。这些音符被分成两组,分别是右手音符和左手音符。该数据库包括音符及其频率和持续时间。计算每个音符的转移概率。随机选取第一个音符后,通过变换矩阵生成以下音符。从结果来看,考虑到人工智能作曲器生成的音符,这两种方法都显示出足够的质量水平。如果考虑到设计标准,一个简单而有效的工具是合适的,作者建议使用马尔可夫链。
{"title":"Artificial Intelligence Composer","authors":"Muammer Catak, Sarah AlRasheedi, Norah AlAli, Ghadeer AlQallaf, Malak AlMeri, Bibi Ali","doi":"10.1109/3ICT53449.2021.9581896","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581896","url":null,"abstract":"In this study, classical music has been investigated mainly based on pieces of well-known composers Mozart and Beethoven, then AI composer based on Markov chains and RNN has been proposed. AI is an efficient tool in science and technology for many specific applications including music field. The database has been collected based on 25 classical music sheets. The notes were separated in two groups where they are right hand and left hand. The database includes the notes and their frequencies and durations. The transition probability of each note were calculated. After the selection of the first note randomly, then the following notes were generated by means of the transition matrix. According to the results, both methods show an adequate level of quality considering the generation of notes by means of AI composer. The authors recommend to use Markov chains if a simple but efficient tool is appropriate considering the design criteria.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effectiveness of Online Teaching during COVID-19 新冠肺炎疫情期间在线教学效果分析
Farheen Akram, Muhammad Abrar ul Haq, H. Malik, Nadeem Mahmood
While considering the challenges of online teaching in the current scenario of Covid-19 pandemic, the current study aimed to analyze the effect of student participation, teachers' skills and strategies, teacher training, teaching domain and teaching perception on effectiveness of online teaching. Primary data was used to test the proposed model of the study, data was collected through emails using convenience sampling from university teachers of Pakistan. Structural equation modelling technique was used through SmartPLS (v.3.3.3) to analyze the model of this research. Findings of the current study indicate that student participation, teachers' skills and strategies, teacher's training, teaching domain and teaching perception have a significant positive effect on effectiveness of online teaching. Hence, this study recommends that universities must have to focus on the individual teachers' need to make online teaching more effective.
考虑到新冠肺炎疫情下在线教学面临的挑战,本研究旨在分析学生参与、教师技能和策略、教师培训、教学领域和教学感知对在线教学有效性的影响。原始数据用于检验本研究提出的模型,数据通过电子邮件收集,使用方便抽样从巴基斯坦的大学教师中收集。采用结构方程建模技术,通过SmartPLS (v.3.3.3)对本研究模型进行分析。本研究结果表明,学生参与、教师技能与策略、教师培训、教学领域和教学感知对网络教学的有效性有显著的正向影响。因此,本研究建议大学必须关注个别教师的需求,以使在线教学更有效。
{"title":"Effectiveness of Online Teaching during COVID-19","authors":"Farheen Akram, Muhammad Abrar ul Haq, H. Malik, Nadeem Mahmood","doi":"10.1109/3ICT53449.2021.9582144","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582144","url":null,"abstract":"While considering the challenges of online teaching in the current scenario of Covid-19 pandemic, the current study aimed to analyze the effect of student participation, teachers' skills and strategies, teacher training, teaching domain and teaching perception on effectiveness of online teaching. Primary data was used to test the proposed model of the study, data was collected through emails using convenience sampling from university teachers of Pakistan. Structural equation modelling technique was used through SmartPLS (v.3.3.3) to analyze the model of this research. Findings of the current study indicate that student participation, teachers' skills and strategies, teacher's training, teaching domain and teaching perception have a significant positive effect on effectiveness of online teaching. Hence, this study recommends that universities must have to focus on the individual teachers' need to make online teaching more effective.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123619786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automated Mapping of Environmental Higher Education Ranking Systems Indicators to SDGs Indicators using Natural Language Processing and Document Similarity 使用自然语言处理和文档相似度的环境高等教育排名系统指标到可持续发展目标指标的自动映射
Anwaar Buzaboon, Hanan Alboflasa, W. Alnaser, S. Shatnawi, Khawla Albinali
To evaluate the ESHERSs and determine their efficiency to measure environmental sustainability, we tackle this problem as a classification assignment. This study benchmark three ESHERSs: UI GreenMetric, Times Higher Education Impact ranking, and STARS (Sustainability Tracking, Assessment Rating System) by AASHE (the association for the advancement of sustainability in higher education). Next, we recruited a group of experts who mapped the ESHERS indicators to the SDGs indicators. Then, we use NLP techniques to classify (map) the ESHERS indicators to the SDGs indicators. Since most of the ESHERS indicators and the SDGs indicators are in the form of short text, we use the query expansion technique to make the NLP techniques more effective. Each ESHERS indicator and its expanded text represents a document. And, each SDG indicator and its expanded text represents a document. We took the expanded text from the description of the ESHERS indicators and the description of SDG indicators, forming the corpus for our study. Then, we used document similarity to find the similarity between every pair of the corpus documents. We used different similarity measures to see the similarity between the forms. Then, we used a voting system to map the ESHERSs indicators to the SDGs indicators. The proposed system was able to automatically map the underlying ranking systems indicators to the UN SDGs with 99% accuracy compared to the experts mapping.
为了评估eshers并确定其衡量环境可持续性的效率,我们将此问题作为分类分配来处理。本研究对三个eshers进行了基准测试:UI GreenMetric, Times Higher Education Impact排名,以及AASHE(高等教育可持续发展促进协会)的STARS(可持续性跟踪评估评级系统)。接下来,我们招募了一组专家,将ESHERS指标与可持续发展目标指标相对应。然后,我们使用自然语言处理技术将ESHERS指标分类(映射)到可持续发展目标指标。由于ESHERS指标和SDGs指标大多采用短文本的形式,我们使用查询扩展技术使NLP技术更加有效。每个ESHERS指标及其扩展文本代表一份文件。而且,每个可持续发展目标指标及其扩展文本代表一份文件。我们从ESHERS指标的描述和SDG指标的描述中提取了扩展文本,形成了我们研究的语料库。然后,我们使用文档相似度来寻找每对语料库文档之间的相似度。我们用不同的相似度来衡量表单之间的相似度。然后,我们使用投票系统将eshers指标映射到可持续发展目标指标。与专家绘制的地图相比,拟议的系统能够自动将基础排名系统指标映射到联合国可持续发展目标,准确率达到99%。
{"title":"Automated Mapping of Environmental Higher Education Ranking Systems Indicators to SDGs Indicators using Natural Language Processing and Document Similarity","authors":"Anwaar Buzaboon, Hanan Alboflasa, W. Alnaser, S. Shatnawi, Khawla Albinali","doi":"10.1109/3ICT53449.2021.9581693","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581693","url":null,"abstract":"To evaluate the ESHERSs and determine their efficiency to measure environmental sustainability, we tackle this problem as a classification assignment. This study benchmark three ESHERSs: UI GreenMetric, Times Higher Education Impact ranking, and STARS (Sustainability Tracking, Assessment Rating System) by AASHE (the association for the advancement of sustainability in higher education). Next, we recruited a group of experts who mapped the ESHERS indicators to the SDGs indicators. Then, we use NLP techniques to classify (map) the ESHERS indicators to the SDGs indicators. Since most of the ESHERS indicators and the SDGs indicators are in the form of short text, we use the query expansion technique to make the NLP techniques more effective. Each ESHERS indicator and its expanded text represents a document. And, each SDG indicator and its expanded text represents a document. We took the expanded text from the description of the ESHERS indicators and the description of SDG indicators, forming the corpus for our study. Then, we used document similarity to find the similarity between every pair of the corpus documents. We used different similarity measures to see the similarity between the forms. Then, we used a voting system to map the ESHERSs indicators to the SDGs indicators. The proposed system was able to automatically map the underlying ranking systems indicators to the UN SDGs with 99% accuracy compared to the experts mapping.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124585624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technology Adoption Intention as a Driver of Success of Women Architect Entrepreneurs 技术采用意愿是女性建筑师企业家成功的驱动力
A. Mittal, H. Bhandari
There are very few studies that directly address the effects of technology adoption intention on the success of women entrepreneurs specifically in the Indian context. The current study addresses the linkage between technology adoption intention and its antecedents on the success of a very niche and unexplored segment of women entrepreneurs i.e., architects. Using a modified form of the unified theory of acceptance and use of technology (UTAUT) model, this study uses structural equation modeling to test the proposed model. The model consists of the following constructs: Mental Access towards technology, Technical Skills, Performance Expectancy, Effort Expectancy, Facilitating Conditions, Social Influence, Technology Adoption Intention, and Women Entrepreneurial Success. The data has been collected from 188 respondents using the chain referral sampling method. The benefit of this study can be seen as a better understanding of technology adoption which will help to reduce barriers that women architects face in technology adoption and devise strategies promoting entrepreneurial success for women architects working all over India.
很少有研究直接讨论技术采用意愿对女性企业家成功的影响,特别是在印度的情况下。目前的研究解决了技术采用意图与其对女企业家(即建筑师)中一个非常小众和未开发的部分的成功的先决条件之间的联系。本文采用改进后的技术接受与使用统一理论(UTAUT)模型,采用结构方程模型对所提出的模型进行检验。该模型由以下构念组成:技术心理获取、技术技能、绩效期望、努力期望、促进条件、社会影响、技术采用意愿和女性创业成功。数据采用连锁推荐抽样法从188名受访者中收集。这项研究的好处可以被看作是对技术采用的更好理解,这将有助于减少女性建筑师在技术采用方面面临的障碍,并制定促进印度各地女性建筑师创业成功的策略。
{"title":"Technology Adoption Intention as a Driver of Success of Women Architect Entrepreneurs","authors":"A. Mittal, H. Bhandari","doi":"10.1109/3ICT53449.2021.9581449","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581449","url":null,"abstract":"There are very few studies that directly address the effects of technology adoption intention on the success of women entrepreneurs specifically in the Indian context. The current study addresses the linkage between technology adoption intention and its antecedents on the success of a very niche and unexplored segment of women entrepreneurs i.e., architects. Using a modified form of the unified theory of acceptance and use of technology (UTAUT) model, this study uses structural equation modeling to test the proposed model. The model consists of the following constructs: Mental Access towards technology, Technical Skills, Performance Expectancy, Effort Expectancy, Facilitating Conditions, Social Influence, Technology Adoption Intention, and Women Entrepreneurial Success. The data has been collected from 188 respondents using the chain referral sampling method. The benefit of this study can be seen as a better understanding of technology adoption which will help to reduce barriers that women architects face in technology adoption and devise strategies promoting entrepreneurial success for women architects working all over India.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Cost-Sensitive Convolutional Neural Network for Network Traffic Classification 网络流量分类中一种有效的代价敏感卷积神经网络
M. S. Sharif, Mina Moein
The volume, and density of computer network traffic are increasing dramatically with the technology advancements, which has led to the emergence of various new protocols. Analyzing the huge data in large business networks has become important for the owners of those networks. As the majority of the developed applications need to guarantee the network services, while some traditional applications may work well enough without a specific service level. Therefore, the performance requirements of future internet traffic will increase to a higher level. Increasing pressure on the performance of computer networks requires addressing several issues, such as maintaining the scalability of new service architectures, establishing control protocols for routing, and distributing information to identified traffic streams. The main concern is flow detection and traffic detection mechanisms to help establish traffic control policies. A cost-sensitive deep learning approach for encrypted traffic classification has been proposed in this research, to confront the effect of the class imbalance problem on the low-frequency traffic data detection. The developed model can attain a high level of performance, particularly for low-frequency traffic data. It outperformed the other traffic classification methods.
随着技术的进步,计算机网络流量的数量和密度急剧增加,这导致了各种新协议的出现。分析大型商业网络中的海量数据对于网络所有者来说已经变得非常重要。由于大多数开发的应用程序都需要保证网络服务,而一些传统应用程序在没有特定服务级别的情况下也可以很好地工作。因此,未来互联网流量的性能要求将会提高到更高的水平。对计算机网络性能的压力越来越大,需要解决几个问题,例如维护新服务体系结构的可伸缩性,建立路由控制协议,以及将信息分发到已识别的流量流。主要关注的是流量检测和流量检测机制,以帮助建立流量控制策略。针对类不平衡问题对低频流量数据检测的影响,本文提出了一种代价敏感的加密流量分类深度学习方法。所开发的模型可以获得高水平的性能,特别是对于低频流量数据。该方法优于其他流量分类方法。
{"title":"An Effective Cost-Sensitive Convolutional Neural Network for Network Traffic Classification","authors":"M. S. Sharif, Mina Moein","doi":"10.1109/3ICT53449.2021.9581789","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581789","url":null,"abstract":"The volume, and density of computer network traffic are increasing dramatically with the technology advancements, which has led to the emergence of various new protocols. Analyzing the huge data in large business networks has become important for the owners of those networks. As the majority of the developed applications need to guarantee the network services, while some traditional applications may work well enough without a specific service level. Therefore, the performance requirements of future internet traffic will increase to a higher level. Increasing pressure on the performance of computer networks requires addressing several issues, such as maintaining the scalability of new service architectures, establishing control protocols for routing, and distributing information to identified traffic streams. The main concern is flow detection and traffic detection mechanisms to help establish traffic control policies. A cost-sensitive deep learning approach for encrypted traffic classification has been proposed in this research, to confront the effect of the class imbalance problem on the low-frequency traffic data detection. The developed model can attain a high level of performance, particularly for low-frequency traffic data. It outperformed the other traffic classification methods.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1