首页 > 最新文献

2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)最新文献

英文 中文
Channel Estimation for Compound Field Extensive Massive MIMO 复合场扩展大规模MIMO的信道估计
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865630
S. T, S. Gandhi
Extensive Massive MIMO (Multiple Input, Multiple Output) has the potential to satisfy the high data rate needs of future 6G. In order to get effective precoding, accurate information about the channel's current condition is critical. Existing Low pilot overhead estimate approaches strongly depend on attained angular domain channel sparsity based on plane wave front in the far field (FF) and polar domain channel sparsity based on spherical wave front in the near field (NF). In practical scenario some scatterers are present in FF region and some are present in NF. However FF as well as NF schemes for estimating the channel is not enough to find out the combined field Extensive Massive MIMO channel. An effective combined field approach for predicting the Extensive Massive MIMO channel is proposed in order to overcome this difficulty. Results from simulations reveal that the suggested approach is more efficient than the current one.
广泛的大规模MIMO(多输入多输出)有潜力满足未来6G的高数据速率需求。为了获得有效的预编码,准确的信道当前状态信息至关重要。现有的低导频开销估计方法严重依赖于基于远场平面波前的角域信道稀疏度和基于近场球面波前的极域信道稀疏度。在实际场景中,一些散射体存在于FF区,一些散射体存在于NF区。但是,FF和NF两种估计信道的方法不足以找出组合场扩展大规模MIMO信道。为了克服这一困难,提出了一种有效的联合场预测方法。仿真结果表明,该方法比现有方法更有效。
{"title":"Channel Estimation for Compound Field Extensive Massive MIMO","authors":"S. T, S. Gandhi","doi":"10.1109/CyberneticsCom55287.2022.9865630","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865630","url":null,"abstract":"Extensive Massive MIMO (Multiple Input, Multiple Output) has the potential to satisfy the high data rate needs of future 6G. In order to get effective precoding, accurate information about the channel's current condition is critical. Existing Low pilot overhead estimate approaches strongly depend on attained angular domain channel sparsity based on plane wave front in the far field (FF) and polar domain channel sparsity based on spherical wave front in the near field (NF). In practical scenario some scatterers are present in FF region and some are present in NF. However FF as well as NF schemes for estimating the channel is not enough to find out the combined field Extensive Massive MIMO channel. An effective combined field approach for predicting the Extensive Massive MIMO channel is proposed in order to overcome this difficulty. Results from simulations reveal that the suggested approach is more efficient than the current one.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LTE Network Resource Management for Live Video Streaming in Dense Area 密集地区实时视频流的LTE网络资源管理
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865381
Borirak Moonphala, Aphirak Jansang, Withawat Tangtrongpairoj, C. Jaikaeo, A. Phonphoem
For live video streaming in areas with unexpected events, such as accidents or protests, the network traffic can dramatically increase beyond the network capacity. All the live streams in the same area become broken, or video quality becomes jittering. Therefore, this paper proposed the LTE radio resource management for live video streaming in dense area. The system will allocate the reserved resource block for priority UE using the concept of prioritization and the Chanel Quality Indicator (CQI) value. The simulation experiment investigated the appropriate reserved block size of priority UE considering the effect on the non priority UE. The results show that priority UE's throughput and inter packet arrival time meet the required criteria with less impact on the non priority UE.
在发生意外事件(如事故或抗议)的地区进行视频直播时,网络流量可能会急剧增加,超出网络容量。同一区域的所有直播流都会中断,或者视频质量变得不稳定。为此,本文提出了面向密集区域视频直播的LTE无线资源管理方法。系统将使用优先级概念和Chanel质量指标(CQI)值为优先UE分配预留的资源块。在仿真实验中,考虑到对非优先级终端的影响,研究了合适的优先级终端保留块大小。结果表明,优先级终端的吞吐量和包间到达时间满足要求,对非优先级终端的影响较小。
{"title":"LTE Network Resource Management for Live Video Streaming in Dense Area","authors":"Borirak Moonphala, Aphirak Jansang, Withawat Tangtrongpairoj, C. Jaikaeo, A. Phonphoem","doi":"10.1109/CyberneticsCom55287.2022.9865381","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865381","url":null,"abstract":"For live video streaming in areas with unexpected events, such as accidents or protests, the network traffic can dramatically increase beyond the network capacity. All the live streams in the same area become broken, or video quality becomes jittering. Therefore, this paper proposed the LTE radio resource management for live video streaming in dense area. The system will allocate the reserved resource block for priority UE using the concept of prioritization and the Chanel Quality Indicator (CQI) value. The simulation experiment investigated the appropriate reserved block size of priority UE considering the effect on the non priority UE. The results show that priority UE's throughput and inter packet arrival time meet the required criteria with less impact on the non priority UE.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Whale Optimization Algorithm for Solving Timetabling Problems of ITC 2019 求解ITC 2019调度问题的混合鲸优化算法
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865647
I. G. A. Premananda, A. Tjahyanto, A. Muklason
Timetabling problem at universities is one of the problems that require more attention in operations research. This problem is known as NP-Hard problem, therefore non-deterministic exact algorithm could solve problems within this category within polynomial time. The heuristic approach can produce a fairly good solution within polynomial time but does not guarantee that the solution is optimal. So, there is always a gap in a heuristic algorithm that can be studied to result enhanced algorithm with better performance. There are a lot of timetabling problem domains in the literature that have been well studied in the scientific literature especially in the field of operational research and artificial intelligence. However, there are still few prior studies reported in the literature that focus on solving relatively new timetabling problem domain of International Timetabling Competition 2019 (ITC 2019). The competition presents real-world datasets with high complexity and large problem sizes. This paper reports our study of developing a novel algorithm called the Hybrid Whale Optimization Algorithm to solve the ITC 2019 problem. The algorithm combines the adapted whale optimization algorithm (WOA) and Late Acceptance Hill Climbing (LAHC) algorithm. The experimental results show that The WOA algorithm successfully improved the average penalty value by 65%. Furthermore, the hybrid WOA improves the WOA algorithm even better, especially on four datasets by 16-43%. Compared to other algorithms reported in the competition, the Hybrid WOA algorithm is ranked 7 out of 13.
高校课程表问题是运筹学研究中亟待关注的问题之一。这个问题被称为NP-Hard问题,因此非确定性精确算法可以在多项式时间内解决这一类问题。启发式方法可以在多项式时间内产生相当好的解,但不能保证解是最优的。因此,启发式算法总是存在一定的缺陷,通过研究这些缺陷,可以得到性能更好的增强算法。在科学文献中,特别是在运筹学和人工智能领域,有许多时间表问题领域已经得到了很好的研究。然而,目前文献中还很少报道针对2019年国际课程表竞赛(ITC 2019)中相对较新的课程表问题领域的研究。该竞赛展示了具有高复杂性和大问题规模的真实数据集。本文报告了我们研究开发一种称为混合鲸优化算法的新算法来解决ITC 2019问题。该算法结合了自适应鲸鱼优化算法(WOA)和后期接受爬坡算法(LAHC)。实验结果表明,WOA算法成功地将平均惩罚值提高了65%。此外,混合WOA算法对WOA算法有更好的改进,特别是在4个数据集上提高了16-43%。与竞赛中报道的其他算法相比,Hybrid WOA算法在13个算法中排名第7。
{"title":"Hybrid Whale Optimization Algorithm for Solving Timetabling Problems of ITC 2019","authors":"I. G. A. Premananda, A. Tjahyanto, A. Muklason","doi":"10.1109/CyberneticsCom55287.2022.9865647","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865647","url":null,"abstract":"Timetabling problem at universities is one of the problems that require more attention in operations research. This problem is known as NP-Hard problem, therefore non-deterministic exact algorithm could solve problems within this category within polynomial time. The heuristic approach can produce a fairly good solution within polynomial time but does not guarantee that the solution is optimal. So, there is always a gap in a heuristic algorithm that can be studied to result enhanced algorithm with better performance. There are a lot of timetabling problem domains in the literature that have been well studied in the scientific literature especially in the field of operational research and artificial intelligence. However, there are still few prior studies reported in the literature that focus on solving relatively new timetabling problem domain of International Timetabling Competition 2019 (ITC 2019). The competition presents real-world datasets with high complexity and large problem sizes. This paper reports our study of developing a novel algorithm called the Hybrid Whale Optimization Algorithm to solve the ITC 2019 problem. The algorithm combines the adapted whale optimization algorithm (WOA) and Late Acceptance Hill Climbing (LAHC) algorithm. The experimental results show that The WOA algorithm successfully improved the average penalty value by 65%. Furthermore, the hybrid WOA improves the WOA algorithm even better, especially on four datasets by 16-43%. Compared to other algorithms reported in the competition, the Hybrid WOA algorithm is ranked 7 out of 13.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114584456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of IoT-Based Aeroponic Farming System 基于物联网的气培农业系统设计与实现
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865284
Riswandi, M. Niswar, Z. Tahir, Zainal, Chong Yung Wey
Urban farming becomes popular and enhances food security in urban areas. Aeroponic is one of the urban farming methods where plant roots are suspended in the air and are supplied with nutrients by mist spraying. This paper describes an IoT system for monitoring and controlling evapotranspiration in an aeroponic environment. The system consists of a microcontroller, single-board computer, sensors, and actuators. The sensors in the system collect the data on plant environment parameters including air temperature, humidity, total dissolved solids (TDS), pH, and water temperature. Then, the system calculates the level of evapotranspiration using the Blaney-Criddle method to determine the appropriate actuator action to reduce the level of evapotranspiration in aeroponic using a fuzzy algorithm. The experimental result shows that our IoT system can reduce evapotranspiration, hence, it can improve the plant quality.
城市农业开始流行,并加强了城市地区的粮食安全。气培法是一种城市耕作方法,将植物根系悬浮在空气中,并通过喷雾提供营养。本文介绍了一种用于监测和控制气培环境中蒸散发的物联网系统。该系统由微控制器、单板计算机、传感器和执行器组成。系统中的传感器采集工厂环境参数数据,包括空气温度、湿度、TDS (total dissolved solids)、pH、水温等。然后,系统利用Blaney-Criddle法计算出气培系统的蒸散发水平,利用模糊算法确定合适的执行器动作来降低气培系统的蒸散发水平。实验结果表明,我们的物联网系统可以减少植物的蒸散量,从而提高植物的品质。
{"title":"Design and Implementation of IoT-Based Aeroponic Farming System","authors":"Riswandi, M. Niswar, Z. Tahir, Zainal, Chong Yung Wey","doi":"10.1109/CyberneticsCom55287.2022.9865284","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865284","url":null,"abstract":"Urban farming becomes popular and enhances food security in urban areas. Aeroponic is one of the urban farming methods where plant roots are suspended in the air and are supplied with nutrients by mist spraying. This paper describes an IoT system for monitoring and controlling evapotranspiration in an aeroponic environment. The system consists of a microcontroller, single-board computer, sensors, and actuators. The sensors in the system collect the data on plant environment parameters including air temperature, humidity, total dissolved solids (TDS), pH, and water temperature. Then, the system calculates the level of evapotranspiration using the Blaney-Criddle method to determine the appropriate actuator action to reduce the level of evapotranspiration in aeroponic using a fuzzy algorithm. The experimental result shows that our IoT system can reduce evapotranspiration, hence, it can improve the plant quality.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129197360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Training Autoencoders with Noisy Training Sets for Detecting Low-rate Attacks on the Network 基于噪声训练集的自编码器网络低速率攻击检测
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865559
B. Pratomo, Ahmad Ibnu Fajar, Abdul Munif, R. Ijtihadie, H. Studiawan, B. J. Santoso
A Network-based Intrusion Detection System (NIDS) monitors network traffic and analyses it to look for any sign of malicious behaviour. A NIDS may be using of these two methods to look for malicious activities, signature-based or anomaly-based. A Signature-based NIDS relies on a database of rulesets to determine whether a packet or a flow is malicious. Therefore, it suffers when the database is not updated regularly or when a zero-day attack appears. An Anomaly-based NIDS works by learning the behaviour of normal traffic and looking for anomalous activities. The anomalous activities are then deemed malicious. In doing so, this kind of NIDS does not have to rely on an updated database. It can identify deviation from the normal behaviour by training itself with some training data obtained from the organisation network traffic. The issue is cleaning the network traffic data from a real-world capture is time-consuming. Thus, in this paper, we proposed an anomaly detection method that was trained with network traffic that contains malicious activities. We were looking for evidence of whether using Autoencoders is robust to noisy data in the training set. Our experiments show that the detection method can achieve an F2-score of 0.87 for FTP traffic, 0.83 for HTTP traffic, and 0.98 for SMTP traffic. These results were obtained from models that had been trained with a training set which contains 0.3% of malicious traffic.
基于网络的入侵检测系统(NIDS)监控网络流量并对其进行分析,以寻找任何恶意行为的迹象。NIDS可能使用这两种方法来查找基于签名或基于异常的恶意活动。基于签名的入侵防御依赖于规则集数据库来确定数据包或流是否是恶意的。因此,当数据库不定期更新或出现零日攻击时,它就会受到影响。基于异常的NIDS通过学习正常流量的行为并寻找异常活动来工作。然后将异常活动视为恶意活动。这样,这种NIDS就不必依赖于更新的数据库。它可以通过从组织网络流量中获得一些训练数据来训练自己,从而识别出与正常行为的偏差。问题是,从实际捕获中清除网络流量数据非常耗时。因此,在本文中,我们提出了一种使用包含恶意活动的网络流量进行训练的异常检测方法。我们正在寻找使用自动编码器是否对训练集中的噪声数据具有鲁棒性的证据。实验表明,该检测方法对FTP流量、HTTP流量和SMTP流量的F2-score分别为0.87、0.83和0.98。这些结果是从使用包含0.3%恶意流量的训练集训练的模型中获得的。
{"title":"Training Autoencoders with Noisy Training Sets for Detecting Low-rate Attacks on the Network","authors":"B. Pratomo, Ahmad Ibnu Fajar, Abdul Munif, R. Ijtihadie, H. Studiawan, B. J. Santoso","doi":"10.1109/CyberneticsCom55287.2022.9865559","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865559","url":null,"abstract":"A Network-based Intrusion Detection System (NIDS) monitors network traffic and analyses it to look for any sign of malicious behaviour. A NIDS may be using of these two methods to look for malicious activities, signature-based or anomaly-based. A Signature-based NIDS relies on a database of rulesets to determine whether a packet or a flow is malicious. Therefore, it suffers when the database is not updated regularly or when a zero-day attack appears. An Anomaly-based NIDS works by learning the behaviour of normal traffic and looking for anomalous activities. The anomalous activities are then deemed malicious. In doing so, this kind of NIDS does not have to rely on an updated database. It can identify deviation from the normal behaviour by training itself with some training data obtained from the organisation network traffic. The issue is cleaning the network traffic data from a real-world capture is time-consuming. Thus, in this paper, we proposed an anomaly detection method that was trained with network traffic that contains malicious activities. We were looking for evidence of whether using Autoencoders is robust to noisy data in the training set. Our experiments show that the detection method can achieve an F2-score of 0.87 for FTP traffic, 0.83 for HTTP traffic, and 0.98 for SMTP traffic. These results were obtained from models that had been trained with a training set which contains 0.3% of malicious traffic.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129216027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCR-Based Power Flow Control for Grid Integration in Home-Scale Photovoltaic System 基于scr的家庭光伏并网潮流控制
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865507
A. M. A. A. Mangkona, Faizal Arya Samman, Syafaruddin
This paper presents Silicon Controlled Rectifier (SCR) based power flow control for grid integration in home-scale photovoltaic system. Power flow control is used to control the power flow from the grid if the power from solar panel and battery cannot meet the power requirements of the load. To control the power on the grid, a full-wave SCR circuit is designed. The full-wave SCR circuit serves to convert 220 Volt AC from the grid into 36 Volt DC. The effect of the delay angle of the SCR on the full-wave SCR output voltage is shown in this paper. A filter with a combination of an inductor (L) and a capacitor (C) which is assembled into an LCLC filter in parallel with the load aims to smooth out ripples in the output voltage. The circuit is designed and modeled in The PSpice program code, then simulated and analyzed. The simulation and implementation test results show that the voltage can work at the setpoint voltage at 100-ohm and 50-ohm loads. The full-wave SCR circuit can supply up to 1.8kW based on the simulation results.
提出了一种基于可控硅的家庭光伏并网潮流控制方法。潮流控制是指当太阳能电池板和蓄电池的功率不能满足负荷的功率要求时,对电网的潮流进行控制。为了控制电网上的功率,设计了全波可控硅电路。全波可控硅电路用于将220伏交流电从电网转换成36伏直流电。本文给出了可控硅延时角对全波可控硅输出电压的影响。由电感(L)和电容(C)组成的滤波器与负载并联组装成LCLC滤波器,目的是消除输出电压中的波纹。在PSpice程序代码中对电路进行了设计和建模,并进行了仿真和分析。仿真和实现测试结果表明,该电压在100欧姆和50欧姆负载下均能在设定值电压下工作。仿真结果表明,全波可控硅电路的供电功率可达1.8kW。
{"title":"SCR-Based Power Flow Control for Grid Integration in Home-Scale Photovoltaic System","authors":"A. M. A. A. Mangkona, Faizal Arya Samman, Syafaruddin","doi":"10.1109/CyberneticsCom55287.2022.9865507","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865507","url":null,"abstract":"This paper presents Silicon Controlled Rectifier (SCR) based power flow control for grid integration in home-scale photovoltaic system. Power flow control is used to control the power flow from the grid if the power from solar panel and battery cannot meet the power requirements of the load. To control the power on the grid, a full-wave SCR circuit is designed. The full-wave SCR circuit serves to convert 220 Volt AC from the grid into 36 Volt DC. The effect of the delay angle of the SCR on the full-wave SCR output voltage is shown in this paper. A filter with a combination of an inductor (L) and a capacitor (C) which is assembled into an LCLC filter in parallel with the load aims to smooth out ripples in the output voltage. The circuit is designed and modeled in The PSpice program code, then simulated and analyzed. The simulation and implementation test results show that the voltage can work at the setpoint voltage at 100-ohm and 50-ohm loads. The full-wave SCR circuit can supply up to 1.8kW based on the simulation results.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An investigation of ML techniques to detect Phishing Websites by complexity reduction 基于降低复杂度的机器学习网络钓鱼网站检测技术研究
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865297
Md. Faiyed Bin Karim, Tasnimul Hasan, Nushera Tazreen, Safayat Bin Hakim, Samiha Tarannum
In today's digital age, one of the predominant causes of the security breaches is phishing web sites that disguise them-selves as legitimate web sites and trick unsuspecting users into revealing sensitive information. With the proliferation of high-speed internet and the popularization of IT education, there is an increase in unscrupulous actors on the web who are always ready to counterfeit a legitimate website and use it to deceive and ma-nipulate users. Software and non-software-based techniques have been used to try to unmask the phishers. Phishing web sites have many characteristics in them. Thus, classifying and detecting those is unavoidably time-consuming and complex. Our research analyzed several hybrid machine learning models, including a bespoke preprocessing step of reducing minimally correlated features and then training with four boosting algorithms and three SVM models for classification. These models have also been trained after hyperparameter tuning. Among the investigated models, XGBoost brought the highest accuracy of 97.0455% after the hyperparameter tuning.
在当今的数字时代,造成安全漏洞的主要原因之一是网络钓鱼网站,这些网站将自己伪装成合法网站,欺骗毫无戒虑的用户泄露敏感信息。随着高速互联网的普及和信息技术教育的普及,网络上的不法分子越来越多,他们随时准备假冒合法网站,并利用它来欺骗和操纵用户。软件和非软件技术已经被用来试图揭开钓鱼者的面纱。网络钓鱼网站有很多特点。因此,对这些信息进行分类和检测不可避免地会耗费大量的时间和时间。我们的研究分析了几种混合机器学习模型,包括减少最小相关特征的定制预处理步骤,然后使用四种增强算法和三种支持向量机模型进行分类训练。这些模型也在超参数调优后进行了训练。在所研究的模型中,经过超参数调优后,XGBoost的准确率最高,达到97.0455%。
{"title":"An investigation of ML techniques to detect Phishing Websites by complexity reduction","authors":"Md. Faiyed Bin Karim, Tasnimul Hasan, Nushera Tazreen, Safayat Bin Hakim, Samiha Tarannum","doi":"10.1109/CyberneticsCom55287.2022.9865297","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865297","url":null,"abstract":"In today's digital age, one of the predominant causes of the security breaches is phishing web sites that disguise them-selves as legitimate web sites and trick unsuspecting users into revealing sensitive information. With the proliferation of high-speed internet and the popularization of IT education, there is an increase in unscrupulous actors on the web who are always ready to counterfeit a legitimate website and use it to deceive and ma-nipulate users. Software and non-software-based techniques have been used to try to unmask the phishers. Phishing web sites have many characteristics in them. Thus, classifying and detecting those is unavoidably time-consuming and complex. Our research analyzed several hybrid machine learning models, including a bespoke preprocessing step of reducing minimally correlated features and then training with four boosting algorithms and three SVM models for classification. These models have also been trained after hyperparameter tuning. Among the investigated models, XGBoost brought the highest accuracy of 97.0455% after the hyperparameter tuning.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"44 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Feature Extraction on Video-Oculography (VOG) and Electro-Oculography (EOG) Signals 视频视觉(VOG)和电视觉(EOG)信号特征提取研究进展
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865308
Iqbal Kurniawan Asmar Putra, Muhammad Ainul Fikri, Syukron Abu Ishaq Alfarozi, S. Wibirama
Eye tracking is used to observe where users are looking, how long they are looking, and what order they are looking. Eye tracking has been widely used in various fields such as helping people with disabilities by using Electro-Oculography (EOG) and analyzing eye movements signal in vestibular patients by using Video-Oculography (VOG). The human eye has a cornea and retina that are located between the front and back of the human eye. Eye movement signal analysis is a necessary step prior to eye movement classification. Selecting a model and tuning the feature extraction algorithm on eye movements are tasks that researchers continue to optimize. However, there are very few studies investigating various feature extraction methods in VOG and EOG signals. To solve this research gap, this paper systematically describes feature extraction that is suitable for use in VOG and EOG signal analysis. Three main factors are important to be considered when choosing a feature extraction method: (1) classification, (2) filters and amplifiers, and (3) dataset characteristics. The results of this literature review can be used as a reference for developing feature extraction algorithms for EOG and VOG applications.
眼动追踪是用来观察用户看的地方,看的时间,看的顺序。眼动追踪技术已广泛应用于各种领域,如利用电眼动图(EOG)帮助残疾人,利用视频眼动图(VOG)分析前庭病人的眼动信号。人的眼睛有一个角膜和视网膜,它们位于人眼的前部和后部之间。眼动信号分析是眼动分类的必要步骤。选择模型和调整眼动特征提取算法是研究人员不断优化的任务。然而,对于各种VOG和EOG信号特征提取方法的研究却很少。为了解决这一研究空白,本文系统地介绍了适合于VOG和EOG信号分析的特征提取方法。在选择特征提取方法时,需要考虑三个主要因素:(1)分类,(2)滤波器和放大器,(3)数据集特征。本文的研究结果可为开发EOG和VOG应用的特征提取算法提供参考。
{"title":"Review of Feature Extraction on Video-Oculography (VOG) and Electro-Oculography (EOG) Signals","authors":"Iqbal Kurniawan Asmar Putra, Muhammad Ainul Fikri, Syukron Abu Ishaq Alfarozi, S. Wibirama","doi":"10.1109/CyberneticsCom55287.2022.9865308","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865308","url":null,"abstract":"Eye tracking is used to observe where users are looking, how long they are looking, and what order they are looking. Eye tracking has been widely used in various fields such as helping people with disabilities by using Electro-Oculography (EOG) and analyzing eye movements signal in vestibular patients by using Video-Oculography (VOG). The human eye has a cornea and retina that are located between the front and back of the human eye. Eye movement signal analysis is a necessary step prior to eye movement classification. Selecting a model and tuning the feature extraction algorithm on eye movements are tasks that researchers continue to optimize. However, there are very few studies investigating various feature extraction methods in VOG and EOG signals. To solve this research gap, this paper systematically describes feature extraction that is suitable for use in VOG and EOG signal analysis. Three main factors are important to be considered when choosing a feature extraction method: (1) classification, (2) filters and amplifiers, and (3) dataset characteristics. The results of this literature review can be used as a reference for developing feature extraction algorithms for EOG and VOG applications.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131227948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid DEMATEL-EDAS Based on Multi-Criteria Decision-Making for A Social Aid Distribution Problem 基于多准则决策的混合DEMATEL-EDAS社会救助分配问题
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865435
I. Irvanizam, Mega Siraturahmi, Aisyah Muthmainnah Binti Irwansyah, P. F. Nasir, Z. Zulfan, Nany Salwa
The office of social affairs has been helping poor or marginalized families through social aid in dealing with poverty. This social aid emphasizes decreasing the poverty rate and economic recovery affected by the COVID-19 pandemic. However, the selection process in the previous year evaluated many families as aid recipient candidates through a conventional process selected by an officer. It would be vulnerable to subjectivity in assessment. Therefore, we attempted to develop a hybrid Multiple Criteria Decision-Making (MCDM) methodology to apply it to this particular decision-making process. This methodology amalgamated the DEMATEL method and the EDAS method with different tasks. Firstly, the DEMATEL method decided the feasible criteria weights automatically based on the proficient decision-maker assessment in estimating a pairwise criteria comparison. Secondly, the EDAS applied the criteria weight values to determine alternatives rank order based on the value of the appraisal score. After comparing with the VIKOR method, the hybrid DEMATEL-EDAS method demonstrated the stability and capability in dealing with the different influence parameters on the final results.
社会事务厅一直通过社会援助帮助贫困或边缘家庭解决贫困问题。这种社会援助的重点是降低受新冠肺炎疫情影响的贫困率和经济复苏。然而,在前一年的选拔过程中,许多家庭都是通过由官员选择的传统程序来评估作为援助接受者的候选人的。在评估中容易出现主观性。因此,我们试图开发一种混合多标准决策(MCDM)方法,将其应用于这一特定的决策过程。该方法将不同任务的DEMATEL法和EDAS法相结合。首先,DEMATEL方法在估计两两标准比较时,根据熟练决策者的评价自动确定可行的标准权重;其次,EDAS根据评价分值的大小,应用标准权重值确定备选方案的排序顺序。通过与VIKOR方法的比较,证明了混合DEMATEL-EDAS方法处理不同参数对最终结果影响的稳定性和能力。
{"title":"A Hybrid DEMATEL-EDAS Based on Multi-Criteria Decision-Making for A Social Aid Distribution Problem","authors":"I. Irvanizam, Mega Siraturahmi, Aisyah Muthmainnah Binti Irwansyah, P. F. Nasir, Z. Zulfan, Nany Salwa","doi":"10.1109/CyberneticsCom55287.2022.9865435","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865435","url":null,"abstract":"The office of social affairs has been helping poor or marginalized families through social aid in dealing with poverty. This social aid emphasizes decreasing the poverty rate and economic recovery affected by the COVID-19 pandemic. However, the selection process in the previous year evaluated many families as aid recipient candidates through a conventional process selected by an officer. It would be vulnerable to subjectivity in assessment. Therefore, we attempted to develop a hybrid Multiple Criteria Decision-Making (MCDM) methodology to apply it to this particular decision-making process. This methodology amalgamated the DEMATEL method and the EDAS method with different tasks. Firstly, the DEMATEL method decided the feasible criteria weights automatically based on the proficient decision-maker assessment in estimating a pairwise criteria comparison. Secondly, the EDAS applied the criteria weight values to determine alternatives rank order based on the value of the appraisal score. After comparing with the VIKOR method, the hybrid DEMATEL-EDAS method demonstrated the stability and capability in dealing with the different influence parameters on the final results.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cataract Detection using Deep Learning Model on Digital Camera Images 基于数码相机图像的深度学习模型白内障检测
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865591
Raghavendra Chaudhary, Arun Kumar
Cataracts are one of the most prevalent visual diseases that people get as they gets older. A cataract is a fog that forms on the lenses of our eyes. The main symptoms of this illness include dim view, colorless, and difficulties in watching a daylight. Slit lamps and fundus cameras are routinely used to detect cataracts, although they are both expensive and require domain knowledge. As a result, the shortage of skilled ophthalmologists may cause cataract identification to be delayed, necessitating medical treatment. Consequently, early detection and prohibition of cataracts might assist to reduce the frequency of occurrence of blindness. Hence the goal of this study is to utilize Convolutional Neural Networks (CNN) to diagnose cataract pathology using a publicly available Digital Camera Image dataset. The CNN cycle takes a considerable amount of time and expense. As a result, optimization will take place. It can increase accuracy while also reducing processing time. In this study the proposed model consist of three Convolutional layers, three pooling layers, one flatten layer, and two dense layers with an ADAM optimizer. The proposed CNN model can detect cataracts with a testing accuracy of 0.9925 with a loss of 0.0475, and a training accuracy of 0.9980 with loss of 0.0038, for the selected Digital Camera Images Dataset.
白内障是人们随着年龄增长而患上的最常见的视觉疾病之一。白内障是在我们眼睛的晶状体上形成的一种雾气。这种疾病的主要症状包括昏暗、无色和看不见日光。裂隙灯和眼底照相机通常用于检测白内障,尽管它们都很昂贵并且需要专业知识。因此,缺乏熟练的眼科医生可能会导致白内障的识别延迟,需要医疗。因此,早期发现和预防白内障可能有助于减少失明的发生频率。因此,本研究的目标是利用卷积神经网络(CNN)使用公开可用的数码相机图像数据集诊断白内障病理。CNN的周期花费了大量的时间和费用。因此,优化将会发生。它可以提高精度,同时也减少加工时间。在本研究中,该模型由三个卷积层、三个池化层、一个平坦层和两个带有ADAM优化器的致密层组成。对于所选的数码相机图像数据集,本文提出的CNN模型检测白内障的测试精度为0.9925,损失为0.0475,训练精度为0.9980,损失为0.0038。
{"title":"Cataract Detection using Deep Learning Model on Digital Camera Images","authors":"Raghavendra Chaudhary, Arun Kumar","doi":"10.1109/CyberneticsCom55287.2022.9865591","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865591","url":null,"abstract":"Cataracts are one of the most prevalent visual diseases that people get as they gets older. A cataract is a fog that forms on the lenses of our eyes. The main symptoms of this illness include dim view, colorless, and difficulties in watching a daylight. Slit lamps and fundus cameras are routinely used to detect cataracts, although they are both expensive and require domain knowledge. As a result, the shortage of skilled ophthalmologists may cause cataract identification to be delayed, necessitating medical treatment. Consequently, early detection and prohibition of cataracts might assist to reduce the frequency of occurrence of blindness. Hence the goal of this study is to utilize Convolutional Neural Networks (CNN) to diagnose cataract pathology using a publicly available Digital Camera Image dataset. The CNN cycle takes a considerable amount of time and expense. As a result, optimization will take place. It can increase accuracy while also reducing processing time. In this study the proposed model consist of three Convolutional layers, three pooling layers, one flatten layer, and two dense layers with an ADAM optimizer. The proposed CNN model can detect cataracts with a testing accuracy of 0.9925 with a loss of 0.0475, and a training accuracy of 0.9980 with loss of 0.0038, for the selected Digital Camera Images Dataset.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1