首页 > 最新文献

Journal of Computing and Natural Science最新文献

英文 中文
A Review on Artificial Intelligence in Internet of Things and Cyber Physical Systems 物联网与网络物理系统中的人工智能研究进展
Pub Date : 2023-01-05 DOI: 10.53759/181x/jcns202303002
A. Haldorai
With the use of Internet of Things (IoT), businesses can easily collect real-time information on all physical components in their operations. The use of Artificial Intelligence (AI) is growing in IoT applications and businesses, signaling a shift in how these businesses operate. Across the globe, businesses are rapidly adopting IoT technology to develop cutting-edge products and services, therefore creating a novel market niches and strategic directions. IoT and CPS (Cyber-Physical Systems) integrated with data science could potentially stimulate the next generation of "smart revolution." The problem that emerges then is how to effectively manage big data engendered with less current processing capacity. This paper reviews the elements of AI, IoT and CPS, including the components of IoT-CPS as well as defining the relationship between AI and IoT-CPS. In the review, it is noted that AI is vital in many application scenarios, but there are problems associated with this technology in the modern world. To deal with problem in an AI-enabled IoT environment, a more reliable AI system should be researched and integrated in real-life applications.
通过使用物联网(IoT),企业可以轻松收集其运营中所有物理组件的实时信息。人工智能(AI)在物联网应用和业务中的应用越来越多,标志着这些业务运营方式的转变。在全球范围内,企业正在迅速采用物联网技术来开发尖端产品和服务,从而创造了新的市场利基和战略方向。物联网和CPS(网络物理系统)与数据科学相结合,可能会激发下一代“智能革命”。随之而来的问题是,如何有效管理当前处理能力不足的大数据。本文回顾了AI、IoT和CPS的要素,包括IoT-CPS的组成部分,以及AI和IoT-CPS之间的关系。在审查中,注意到人工智能在许多应用场景中至关重要,但在现代世界中存在与该技术相关的问题。为了在人工智能支持的物联网环境中解决问题,应该研究一个更可靠的人工智能系统,并将其集成到实际应用中。
{"title":"A Review on Artificial Intelligence in Internet of Things and Cyber Physical Systems","authors":"A. Haldorai","doi":"10.53759/181x/jcns202303002","DOIUrl":"https://doi.org/10.53759/181x/jcns202303002","url":null,"abstract":"With the use of Internet of Things (IoT), businesses can easily collect real-time information on all physical components in their operations. The use of Artificial Intelligence (AI) is growing in IoT applications and businesses, signaling a shift in how these businesses operate. Across the globe, businesses are rapidly adopting IoT technology to develop cutting-edge products and services, therefore creating a novel market niches and strategic directions. IoT and CPS (Cyber-Physical Systems) integrated with data science could potentially stimulate the next generation of \"smart revolution.\" The problem that emerges then is how to effectively manage big data engendered with less current processing capacity. This paper reviews the elements of AI, IoT and CPS, including the components of IoT-CPS as well as defining the relationship between AI and IoT-CPS. In the review, it is noted that AI is vital in many application scenarios, but there are problems associated with this technology in the modern world. To deal with problem in an AI-enabled IoT environment, a more reliable AI system should be researched and integrated in real-life applications.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131194699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Evaluation of Side Channel Attacks on CPS Architectures 基于CPS架构的侧信道攻击安全性评估
Pub Date : 2022-10-05 DOI: 10.53759/181x/jcns202202018
X. Hou, Donglai Lu
"Smart-Embedded Systems," or Cyber-Physical Systems (CPS), bring together physical, computational, and network resources into a single integrated system. These resources are put to work to provide a solid basis for a better quality of life and a more upscale standard of living. CPSs (Cyber-Physical Systems) are vital in supporting the need for smart products (e.g., airports, homes, cities, hospitals). Control the three sorts of resources Doi: physical, cognitive, and network. In order to uncover the essential knowledge in the various real-life segments, e.g., distribution, power transmission and telecommunication, CPSs stimulates human-to-human interaction via this regulatory measure Information security is a critical concern in today's technological world. Due to the complexity of the components and middleware in CPS, it is difficult to keep them safe from cyberattacks while yet allowing them to operate quickly and effectively. An in-depth explanation of CPS, their issues (including cyber threats), characteristics, and associated technology is provided in this paper Aside from security and performance, we also describe the prevalent Side Channel Attacks (SCA) e.g., Differential Power Analysis (DPA) and Simple Power Analysis (SPA), on cryptographic techniques (such as RSA and AES) and the countermeasures that may be used to protect against these attacks.
“智能嵌入式系统”或网络物理系统(CPS)将物理、计算和网络资源整合到一个单一的集成系统中。这些资源被用来为更好的生活质量和更高的生活水平提供坚实的基础。cps(网络物理系统)对于支持智能产品的需求至关重要(例如,机场、家庭、城市、医院)。控制三种资源:物理资源、认知资源和网络资源。为了揭示各种现实生活领域的基本知识,例如,配电,电力传输和电信,cps通过这种监管措施刺激人与人之间的互动。信息安全是当今技术世界的一个关键问题。由于CPS中的组件和中间件的复杂性,很难保证它们免受网络攻击,同时又能让它们快速有效地运行。本文对CPS及其问题(包括网络威胁)、特征和相关技术进行了深入的解释,除了安全性和性能之外,我们还描述了加密技术(如RSA和AES)上流行的侧信道攻击(SCA),例如差分功率分析(DPA)和简单功率分析(SPA),以及可用于防止这些攻击的对策。
{"title":"Security Evaluation of Side Channel Attacks on CPS Architectures","authors":"X. Hou, Donglai Lu","doi":"10.53759/181x/jcns202202018","DOIUrl":"https://doi.org/10.53759/181x/jcns202202018","url":null,"abstract":"\"Smart-Embedded Systems,\" or Cyber-Physical Systems (CPS), bring together physical, computational, and network resources into a single integrated system. These resources are put to work to provide a solid basis for a better quality of life and a more upscale standard of living. CPSs (Cyber-Physical Systems) are vital in supporting the need for smart products (e.g., airports, homes, cities, hospitals). Control the three sorts of resources Doi: physical, cognitive, and network. In order to uncover the essential knowledge in the various real-life segments, e.g., distribution, power transmission and telecommunication, CPSs stimulates human-to-human interaction via this regulatory measure Information security is a critical concern in today's technological world. Due to the complexity of the components and middleware in CPS, it is difficult to keep them safe from cyberattacks while yet allowing them to operate quickly and effectively. An in-depth explanation of CPS, their issues (including cyber threats), characteristics, and associated technology is provided in this paper Aside from security and performance, we also describe the prevalent Side Channel Attacks (SCA) e.g., Differential Power Analysis (DPA) and Simple Power Analysis (SPA), on cryptographic techniques (such as RSA and AES) and the countermeasures that may be used to protect against these attacks.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124513279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of Algorithms, Frameworks and Implementation of Deep Machine Learning Algorithms 深度机器学习算法、框架和实现综述
Pub Date : 2022-10-05 DOI: 10.53759/181x/jcns202202016
Ivan Leonid
Machine Learning (ML) is increasingly being used in intelligent systems that can perform Artificial Intelligence (AI) functions. Analytical model development and solving problems related with it may be automated by machine learning, which explains the ability of computers to learn from problem-specific learning algorithm. Depending on artificial neural networks, "deep learning" is a kind of machine learning. The performance of deep learning techniques is superior to that of superficial machine learning techniques and conventional methods of data analysis in many situations. Deep Machine Learning (DML) algorithms and frameworks that have been implemented to and supported by wireless communication systems have been thoroughly analyzed in this paper. User associations, power latency and allocation; bandwidth assignment and user selections, and; cloud computing technology on the edge have both been suggested as potential DML implementations.
机器学习(ML)越来越多地用于可以执行人工智能(AI)功能的智能系统。分析模型的开发和解决与之相关的问题可以通过机器学习自动化,这解释了计算机从特定问题的学习算法中学习的能力。基于人工神经网络的“深度学习”是机器学习的一种。在许多情况下,深度学习技术的性能优于肤浅的机器学习技术和传统的数据分析方法。本文对无线通信系统支持的深度机器学习(DML)算法和框架进行了深入的分析。用户关联、电力延迟和分配;带宽分配和用户选择;边缘的云计算技术都被认为是潜在的DML实现。
{"title":"Review of Algorithms, Frameworks and Implementation of Deep Machine Learning Algorithms","authors":"Ivan Leonid","doi":"10.53759/181x/jcns202202016","DOIUrl":"https://doi.org/10.53759/181x/jcns202202016","url":null,"abstract":"Machine Learning (ML) is increasingly being used in intelligent systems that can perform Artificial Intelligence (AI) functions. Analytical model development and solving problems related with it may be automated by machine learning, which explains the ability of computers to learn from problem-specific learning algorithm. Depending on artificial neural networks, \"deep learning\" is a kind of machine learning. The performance of deep learning techniques is superior to that of superficial machine learning techniques and conventional methods of data analysis in many situations. Deep Machine Learning (DML) algorithms and frameworks that have been implemented to and supported by wireless communication systems have been thoroughly analyzed in this paper. User associations, power latency and allocation; bandwidth assignment and user selections, and; cloud computing technology on the edge have both been suggested as potential DML implementations.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"31 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120837835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Review of Medical Cyber Physical System Architecture and STP Issues 医疗网络物理系统架构及STP问题综述
Pub Date : 2022-10-05 DOI: 10.53759/181x/jcns202202019
Zhonghe Zuyan
Medical Cyber-Physical System (MCPS) is a system of diagnostic instruments that is vital to healthcare. Hospitals are increasingly using these technologies to ensure that patients get high-quality treatment at all times. To name just a few, the MCPS system software confronts high assurance requirements, inoperability, security and privacy, and a host of other issues. There is an assessment and discussion of the CPS infrastructure in the present work. The study into interconnected medical device systems (MDs) to improve healthcare safety and efficiency was improved by this article. In addition, experts in medical device design may benefit from this software, which can aid them in overcoming critical obstacles and challenges in the design of the healthcare device's networks. Wireless Sensor Networks (WSNs) and networking are both discussed, as well as their respective security. After that, the CPS technologies and frameworks were built, and greater attention was paid to CPS-based healthcare.
医疗信息物理系统(MCPS)是一个对医疗保健至关重要的诊断仪器系统。医院越来越多地使用这些技术来确保患者在任何时候都能得到高质量的治疗。仅举几个例子,MCPS系统软件面临着高保证要求、不可操作性、安全性和隐私性以及许多其他问题。在目前的工作中,对CPS基础设施进行了评估和讨论。本文旨在促进互联医疗设备系统(MDs)的研究,以提高医疗安全与效率。此外,医疗设备设计专家可以从该软件中受益,该软件可以帮助他们克服医疗设备网络设计中的关键障碍和挑战。讨论了无线传感器网络(WSNs)和网络,以及它们各自的安全性。此后,建立了CPS技术和框架,并更加重视基于CPS的医疗保健。
{"title":"An Review of Medical Cyber Physical System Architecture and STP Issues","authors":"Zhonghe Zuyan","doi":"10.53759/181x/jcns202202019","DOIUrl":"https://doi.org/10.53759/181x/jcns202202019","url":null,"abstract":"Medical Cyber-Physical System (MCPS) is a system of diagnostic instruments that is vital to healthcare. Hospitals are increasingly using these technologies to ensure that patients get high-quality treatment at all times. To name just a few, the MCPS system software confronts high assurance requirements, inoperability, security and privacy, and a host of other issues. There is an assessment and discussion of the CPS infrastructure in the present work. The study into interconnected medical device systems (MDs) to improve healthcare safety and efficiency was improved by this article. In addition, experts in medical device design may benefit from this software, which can aid them in overcoming critical obstacles and challenges in the design of the healthcare device's networks. Wireless Sensor Networks (WSNs) and networking are both discussed, as well as their respective security. After that, the CPS technologies and frameworks were built, and greater attention was paid to CPS-based healthcare.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis on Intelligent Agent based Approach for Software Engineering 基于智能代理的软件工程方法分析
Pub Date : 2022-10-05 DOI: 10.53759/181x/jcns202202020
A. Haldorai
A broad area of research, known as "Agent-Based Computing", focuses on developing "agent-based" intelligent software using agent-based techniques. However, there is a scarcity of research focusing on providing enough evidence of the superiority of agent-based techniques in creating complex software systems. This article has attempted to provide evidence for why agent-based techniques are superior to traditional methods for creating complex software systems, such as control systems. A case of a distinct agent-based control system (the power transportation management system used by Iber-26 drola) is used to illustrate these broader principles. This line of reasoning allows advocates of complex software engineering paradigms to accurately assert that their method can replicate the essential ideas behind agent-based computing. When broken down to their most basic components, agent-based systems are just computer programmes, and every programme has the same set of computable functionalities. The value of a paradigm lies in the way of thinking and the tools it teaches to programmers. As such, agent-based ideas and approaches are not just an extension of those now accessible within existing paradigms, but also well suited to the development of large, networked systems.
一个广泛的研究领域,被称为“基于代理的计算”,专注于使用基于代理的技术开发“基于代理的”智能软件。然而,缺乏足够的证据来证明基于代理的技术在创建复杂软件系统方面的优越性。本文试图提供证据,说明为什么基于代理的技术优于创建复杂软件系统(如控制系统)的传统方法。一个独特的基于代理的控制系统(Iber-26 drola使用的电力运输管理系统)的案例被用来说明这些更广泛的原则。这条推理路线允许复杂软件工程范式的倡导者准确地断言他们的方法可以复制基于代理的计算背后的基本思想。当分解为最基本的组件时,基于代理的系统只是计算机程序,每个程序都具有相同的可计算功能集。范式的价值在于它教给程序员的思维方式和工具。因此,基于代理的思想和方法不仅是现有范例中可访问的思想和方法的扩展,而且非常适合大型网络系统的开发。
{"title":"Analysis on Intelligent Agent based Approach for Software Engineering","authors":"A. Haldorai","doi":"10.53759/181x/jcns202202020","DOIUrl":"https://doi.org/10.53759/181x/jcns202202020","url":null,"abstract":"A broad area of research, known as \"Agent-Based Computing\", focuses on developing \"agent-based\" intelligent software using agent-based techniques. However, there is a scarcity of research focusing on providing enough evidence of the superiority of agent-based techniques in creating complex software systems. This article has attempted to provide evidence for why agent-based techniques are superior to traditional methods for creating complex software systems, such as control systems. A case of a distinct agent-based control system (the power transportation management system used by Iber-26 drola) is used to illustrate these broader principles. This line of reasoning allows advocates of complex software engineering paradigms to accurately assert that their method can replicate the essential ideas behind agent-based computing. When broken down to their most basic components, agent-based systems are just computer programmes, and every programme has the same set of computable functionalities. The value of a paradigm lies in the way of thinking and the tools it teaches to programmers. As such, agent-based ideas and approaches are not just an extension of those now accessible within existing paradigms, but also well suited to the development of large, networked systems.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128930744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Evaluation of Internet of Things and Cyber-Physical System Integration 物联网与信息物理系统集成评估
Pub Date : 2022-10-05 DOI: 10.53759/181x/jcns202202017
Burova Margarita
In order to make physical systems run more efficiently and effectively at multiple levels of information processing, Cyber-Physical Systems (CPS) combine physical processes, Computing, Communication, and Control (the 3Cs) into a single system. There are many factors that make solving the problem of packet transmission in CPS difficult, including unforeseeable node mobility, low number of nodes, lack of global data, and intermittent network access. Currently, there is no good answer to this problem in the literature. The impact of the CPS on engineered systems is much greater in the present and future. Cyber-physical system integration often presents unique challenges in the fields of design, implementation, and application. One of the goals of this research is to better understand the various definitions of an integrated CPS, as well as the growth of new research areas in this field. The application of CPSs faces a number of difficulties, including those related to efficiency, reliability, controllability, and security. We are moving forward in technological innovation with the development of CPSs and the Internet of Things (IoT). It is possible for engineers to gain a better understanding of engineering systems and management modules by utilizing the CPS-IoT models.
为了使物理系统在多层次的信息处理中更高效地运行,信息物理系统(CPS)将物理过程、计算、通信和控制(3c)结合到一个单一的系统中。导致CPS中数据包传输问题难以解决的因素有很多,如节点迁移不可预见、节点数量少、缺乏全局数据、网络接入时断时续等。目前,在文献中没有很好的回答这个问题。在现在和将来,CPS对工程系统的影响要大得多。信息物理系统集成在设计、实现和应用等方面都面临着独特的挑战。本研究的目标之一是更好地理解集成CPS的各种定义,以及该领域新研究领域的发展。cps的应用面临着效率、可靠性、可控性和安全性等诸多难题。随着cps和物联网(IoT)的发展,我们正在推进技术创新。通过利用CPS-IoT模型,工程师可以更好地理解工程系统和管理模块。
{"title":"An Evaluation of Internet of Things and Cyber-Physical System Integration","authors":"Burova Margarita","doi":"10.53759/181x/jcns202202017","DOIUrl":"https://doi.org/10.53759/181x/jcns202202017","url":null,"abstract":"In order to make physical systems run more efficiently and effectively at multiple levels of information processing, Cyber-Physical Systems (CPS) combine physical processes, Computing, Communication, and Control (the 3Cs) into a single system. There are many factors that make solving the problem of packet transmission in CPS difficult, including unforeseeable node mobility, low number of nodes, lack of global data, and intermittent network access. Currently, there is no good answer to this problem in the literature. The impact of the CPS on engineered systems is much greater in the present and future. Cyber-physical system integration often presents unique challenges in the fields of design, implementation, and application. One of the goals of this research is to better understand the various definitions of an integrated CPS, as well as the growth of new research areas in this field. The application of CPSs faces a number of difficulties, including those related to efficiency, reliability, controllability, and security. We are moving forward in technological innovation with the development of CPSs and the Internet of Things (IoT). It is possible for engineers to gain a better understanding of engineering systems and management modules by utilizing the CPS-IoT models.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Critical Review of the Applications and AI Techniques for Anomaly Detection 异常检测应用与人工智能技术综述
Pub Date : 2022-07-05 DOI: 10.53759/181x/jcns202202013
Sidny Chalhoub
In the process of analysing data, outlier detection (i.e., anomaly detection or novelty identification) is often misinterpreted to an identification of rare observations, occurrence or an item, which deviates highly from enormous data and never conforms to well- defined ideologies of a normal behaviour. The samples could stimulate more suspicion of being produced from various techniques, or appear unpredictable with the remaining portion of the specific dataset. Anomaly detection draws application in different domains such as neuroscience, statistics, machine vision, medicine, financial fraud, law enforcement and cyber security. The data that has been collected from real-life applications are rapidly increasing in dimension and size. As the aspect of dimensionality keeps increasing, data items become significantly sparse, amounting to an identification of variances becoming problematic. In addition, more conventional approaches for anomaly detection cannot function in a proper manner. In this paper, we have evaluated the applications and methods of anomaly detection.
在分析数据的过程中,异常点检测(即异常检测或新颖性识别)经常被误解为对罕见观测、事件或项目的识别,这些项目高度偏离大量数据,从不符合正常行为的良好定义。这些样本可能会引起更多的怀疑,怀疑它们是由各种技术产生的,或者对特定数据集的剩余部分似乎是不可预测的。异常检测在神经科学、统计学、机器视觉、医学、金融欺诈、执法和网络安全等不同领域都有应用。从实际应用程序中收集的数据在维度和大小上都在迅速增加。随着维度方面的不断增加,数据项变得非常稀疏,导致方差的识别变得有问题。此外,更传统的异常检测方法无法以适当的方式发挥作用。在本文中,我们评估了异常检测的应用和方法。
{"title":"A Critical Review of the Applications and AI Techniques for Anomaly Detection","authors":"Sidny Chalhoub","doi":"10.53759/181x/jcns202202013","DOIUrl":"https://doi.org/10.53759/181x/jcns202202013","url":null,"abstract":"In the process of analysing data, outlier detection (i.e., anomaly detection or novelty identification) is often misinterpreted to an identification of rare observations, occurrence or an item, which deviates highly from enormous data and never conforms to well- defined ideologies of a normal behaviour. The samples could stimulate more suspicion of being produced from various techniques, or appear unpredictable with the remaining portion of the specific dataset. Anomaly detection draws application in different domains such as neuroscience, statistics, machine vision, medicine, financial fraud, law enforcement and cyber security. The data that has been collected from real-life applications are rapidly increasing in dimension and size. As the aspect of dimensionality keeps increasing, data items become significantly sparse, amounting to an identification of variances becoming problematic. In addition, more conventional approaches for anomaly detection cannot function in a proper manner. In this paper, we have evaluated the applications and methods of anomaly detection.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132620806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine Learning and AI Application Behaviour Prediction for User Experience Modelling and Optimization 面向用户体验建模与优化的机器学习与人工智能应用行为预测
Pub Date : 2022-07-05 DOI: 10.53759/181x/jcns202202015
Christopher Neilson, Price Grigore
The purpose of this research is to offer a technique for assessing user experience in mobile applications utilizing AIAM technology. Due to ineffective and time-consuming nature of conventional data gathering techniques (such as user interviews and user inference), AIAM concentrates on using Artificial Intelligence (AI) to assess and enhance user experience. Logs from a mobile application may be used to gather information about user activity. Only a few parameters of data are utilized in the process of surfing and running mobile applications to ensure the privacy of users. The method's objective is to create the deep neural network prototype as close as feasible to a user's experience when using a mobile app. For particular objectives, we create and employ application interfaces to train computational models. The click data from all users participating in a certain task is shown on these projected pages. User activity may therefore be mapped in connected and hidden layers of the system. Finally, the social communications application is used to test the efficacy of the suggested method by implementing the improved design.
本研究的目的是提供一种利用AIAM技术评估移动应用程序用户体验的技术。由于传统的数据收集技术(如用户访谈和用户推理)效率低下且耗时,AIAM专注于使用人工智能(AI)来评估和增强用户体验。来自移动应用程序的日志可用于收集有关用户活动的信息。在用户浏览和运行移动应用程序的过程中,只使用少量的数据参数,以确保用户的隐私。该方法的目标是在使用移动应用程序时创建尽可能接近用户体验的深度神经网络原型。对于特定目标,我们创建并使用应用程序接口来训练计算模型。参与某个任务的所有用户的点击数据显示在这些投影页面上。因此,用户活动可以映射到系统的连接层和隐藏层。最后,通过对改进设计的实现,在社交应用中验证了所提方法的有效性。
{"title":"Machine Learning and AI Application Behaviour Prediction for User Experience Modelling and Optimization","authors":"Christopher Neilson, Price Grigore","doi":"10.53759/181x/jcns202202015","DOIUrl":"https://doi.org/10.53759/181x/jcns202202015","url":null,"abstract":"The purpose of this research is to offer a technique for assessing user experience in mobile applications utilizing AIAM technology. Due to ineffective and time-consuming nature of conventional data gathering techniques (such as user interviews and user inference), AIAM concentrates on using Artificial Intelligence (AI) to assess and enhance user experience. Logs from a mobile application may be used to gather information about user activity. Only a few parameters of data are utilized in the process of surfing and running mobile applications to ensure the privacy of users. The method's objective is to create the deep neural network prototype as close as feasible to a user's experience when using a mobile app. For particular objectives, we create and employ application interfaces to train computational models. The click data from all users participating in a certain task is shown on these projected pages. User activity may therefore be mapped in connected and hidden layers of the system. Finally, the social communications application is used to test the efficacy of the suggested method by implementing the improved design.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of CPS Design and Vulnerability Analysis CPS设计与脆弱性分析综述
Pub Date : 2022-07-05 DOI: 10.53759/181x/jcns202202014
A. Vilán, Pamela N. Walker
Cyber-Physical Systems (CPS) offer a wide array of applications. Integration of various heterogeneous infrastructures that generate data for intelligent analysis is discussed. The objective of this article is to review CPS and provide a discussion of the system's security flaws. Many earlier investigations have also been properly explained. Because of the increasing usage of CPS in sensitive organizations (e.g., healthcare and connected homes), the requirement for a risk assessment strategy is essential. The major concentration of risk evaluation has shifted from computer risk evaluation to network-based risk analysis as a result of our substantial dependence on the Internet. The goal of CPS vulnerability analysis is to develop a quantitative model for future system protection.
信息物理系统(CPS)提供了广泛的应用。讨论了为智能分析生成数据的各种异构基础设施的集成。本文的目的是回顾CPS并讨论系统的安全缺陷。许多早期的调查也得到了适当的解释。由于敏感组织(例如,医疗保健和互联家庭)越来越多地使用CPS,因此对风险评估战略的需求至关重要。由于我们对互联网的高度依赖,风险评估的重点已经从计算机风险评估转向基于网络的风险分析。CPS漏洞分析的目标是为未来的系统保护建立一个定量模型。
{"title":"A Review of CPS Design and Vulnerability Analysis","authors":"A. Vilán, Pamela N. Walker","doi":"10.53759/181x/jcns202202014","DOIUrl":"https://doi.org/10.53759/181x/jcns202202014","url":null,"abstract":"Cyber-Physical Systems (CPS) offer a wide array of applications. Integration of various heterogeneous infrastructures that generate data for intelligent analysis is discussed. The objective of this article is to review CPS and provide a discussion of the system's security flaws. Many earlier investigations have also been properly explained. Because of the increasing usage of CPS in sensitive organizations (e.g., healthcare and connected homes), the requirement for a risk assessment strategy is essential. The major concentration of risk evaluation has shifted from computer risk evaluation to network-based risk analysis as a result of our substantial dependence on the Internet. The goal of CPS vulnerability analysis is to develop a quantitative model for future system protection.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126224474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Motivation, Definition, Application and the Future of Edge Artificial Intelligence 边缘人工智能的动机、定义、应用和未来
Pub Date : 2022-07-05 DOI: 10.53759/181x/jcns202202011
A. Haldorai, Shrinand Anandakumar
The term " Edge Artificial Intelligence (Edge AI)" refers to the part of a network where data is analysed and aggregated. Dispersed networks, such as those found in the Internet of Things (IoT), have enormous ramifications when it comes to "Edge AI," or "intelligence at the edge". Smartphone applications like real-time traffic data and facial recognition data, including semi-autonomous smart devices and automobiles are integrated in this class. Edge AI products include wearable health monitors, security cameras, drones, robots, smart speakers and video games. Edge AI was established due to the marriage of Artificial Intelligence with cutting Edge Computing (EC) systems. Edge Intelligence (EI) is a terminology utilized to define the model learning or the inference processes, which happen at the system edge by employing available computational resources and data from the edge nodes to the end devices under cloud computing paradigm. This paper provides a light on "Edge AI" and the elements that contribute to it. In this paper, Edge AI's motivation, definition, applications, and long-term prospects are examined.
术语“边缘人工智能(Edge AI)”是指网络中分析和汇总数据的部分。分散的网络,比如在物联网(IoT)中发现的网络,在“边缘人工智能”或“边缘智能”方面有着巨大的影响。智能手机应用程序,如实时交通数据和面部识别数据,包括半自动智能设备和汽车都集成在这类中。边缘人工智能产品包括可穿戴健康监视器、安全摄像头、无人机、机器人、智能扬声器和视频游戏。由于人工智能与尖端计算(EC)系统的结合,边缘人工智能得以建立。边缘智能(Edge Intelligence, EI)是一个术语,用于定义在云计算范式下,利用可用的计算资源和从边缘节点到终端设备的数据,在系统边缘发生的模型学习或推理过程。本文介绍了“边缘人工智能”及其构成要素。本文对边缘人工智能的动机、定义、应用和长期前景进行了研究。
{"title":"Motivation, Definition, Application and the Future of Edge Artificial Intelligence","authors":"A. Haldorai, Shrinand Anandakumar","doi":"10.53759/181x/jcns202202011","DOIUrl":"https://doi.org/10.53759/181x/jcns202202011","url":null,"abstract":"The term \" Edge Artificial Intelligence (Edge AI)\" refers to the part of a network where data is analysed and aggregated. Dispersed networks, such as those found in the Internet of Things (IoT), have enormous ramifications when it comes to \"Edge AI,\" or \"intelligence at the edge\". Smartphone applications like real-time traffic data and facial recognition data, including semi-autonomous smart devices and automobiles are integrated in this class. Edge AI products include wearable health monitors, security cameras, drones, robots, smart speakers and video games. Edge AI was established due to the marriage of Artificial Intelligence with cutting Edge Computing (EC) systems. Edge Intelligence (EI) is a terminology utilized to define the model learning or the inference processes, which happen at the system edge by employing available computational resources and data from the edge nodes to the end devices under cloud computing paradigm. This paper provides a light on \"Edge AI\" and the elements that contribute to it. In this paper, Edge AI's motivation, definition, applications, and long-term prospects are examined.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131681551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Computing and Natural Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1