首页 > 最新文献

2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)最新文献

英文 中文
Clustering Analysis of Bangla News Articles with TF-IDF & CV Using Mini-Batch K-Means and K-Means 基于TF-IDF和CV的孟加拉语新闻文章聚类分析
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865339
S. Hasan, Wang Ruiqin, Md Gulzar Hussain
Document clustering is the compilation of docu-ments relating to textual content into classes or clusters. The primary objective is to group the documents that are internally logical but substantially different from each other. It is a vital method used in the retrieval of information, extraction of information and organization of records. Around 210 million people worldwide speak Bangla as a first or second language. With the passage of time, these computer-assisted approaches were also used in the Bangla language. However, not enough paper has represented the current state of research in Bangla Document Clustering. The ultimate aim of this work is to achieve the objective of testing K-Means clustering and Mini-Batch K-Means clustering algorithms and analysing the performance with silhouette score and homogeneity score of these algorithms for Bangla news text data. The findings shows that with TF-IDF both K-Mean and MiniBatch K-Mean algorithms gives silhouette score of 0.031 & 0.015 and homogeneity score of 0.33 & 0.27 for 11 clusters which is better than the results with CountVectorizer.
文档聚类是将与文本内容相关的文档汇编成类或簇。主要目标是对内部具有逻辑但彼此之间存在本质差异的文档进行分组。它是信息检索、信息提取和记录组织的重要方法。全世界约有2.1亿人将孟加拉语作为第一或第二语言。随着时间的推移,这些计算机辅助的方法也被用于孟加拉语。然而,代表孟加拉语文献聚类研究现状的论文并不多。本工作的最终目的是达到对K-Means聚类和Mini-Batch K-Means聚类算法进行测试的目的,并对这些算法在孟加拉语新闻文本数据上的剪影分数和同质分数进行性能分析。结果表明,TF-IDF K-Mean和MiniBatch K-Mean算法对11个聚类的轮廓评分分别为0.031和0.015,均匀性评分分别为0.33和0.27,优于CountVectorizer算法。
{"title":"Clustering Analysis of Bangla News Articles with TF-IDF & CV Using Mini-Batch K-Means and K-Means","authors":"S. Hasan, Wang Ruiqin, Md Gulzar Hussain","doi":"10.1109/CyberneticsCom55287.2022.9865339","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865339","url":null,"abstract":"Document clustering is the compilation of docu-ments relating to textual content into classes or clusters. The primary objective is to group the documents that are internally logical but substantially different from each other. It is a vital method used in the retrieval of information, extraction of information and organization of records. Around 210 million people worldwide speak Bangla as a first or second language. With the passage of time, these computer-assisted approaches were also used in the Bangla language. However, not enough paper has represented the current state of research in Bangla Document Clustering. The ultimate aim of this work is to achieve the objective of testing K-Means clustering and Mini-Batch K-Means clustering algorithms and analysing the performance with silhouette score and homogeneity score of these algorithms for Bangla news text data. The findings shows that with TF-IDF both K-Mean and MiniBatch K-Mean algorithms gives silhouette score of 0.031 & 0.015 and homogeneity score of 0.33 & 0.27 for 11 clusters which is better than the results with CountVectorizer.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Integration of End User Computing Satisfaction and Importance Performance Analysis on Website 网站终端用户计算满意度与重要性性能分析的集成
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865609
Anggun Barokhah, M. L. Hamzah, Eki Saputra, Fitriani Muttakin
Media Website “Diskominfotik” Bengkalis is a form of e-learning developed by the Department of Communication, Information and Statistics which plays an important role in the development of Bengkalis district. The services and features provided are in the form of bengkalis news, activity galleries, important announcements, activity videos, public information and activity agendas. This study is based on the fact that users are dissatisfied with the services provided by the Bengkalis Diskominfotik website, such as the lack of updated information that users need. The aim of this study was to measure the level of satisfaction of website users using the EUCS method with five perspectives, namely content, accuracy, format, ease of use, and timeliness and the IPA method to find out the attributes that are important to improve or need to be interpreted in the form of a matrix. The results of this study indicated that all attributes in terms of importance had the category of satisfied and quite satisfied, and the performance attribute was also in the category of satisfied and quite satisfied. namely the variable content, accuracy, ease of use, with the category satisfied, while the format with the category quite satisfied.
媒体网站“Diskominfotik”Bengkalis是由通讯、信息和统计部门开发的一种电子学习形式,该部门在Bengkalis地区的发展中发挥着重要作用。提供的服务和功能以bengkalis新闻,活动画廊,重要公告,活动视频,公共信息和活动议程的形式提供。本研究基于用户对Bengkalis Diskominfotik网站提供的服务不满意的事实,例如缺乏用户需要的更新信息。本研究的目的是使用EUCS方法从内容、准确性、格式、易用性和时效性五个角度来衡量网站用户的满意度水平,并使用IPA方法以矩阵的形式找出需要改进或需要解释的重要属性。本研究结果表明,各属性在重要性上均存在满意和比较满意的类别,绩效属性也存在满意和比较满意的类别。即内容可变,准确性高,易用性好,与分类满意,而格式与分类相当满意。
{"title":"An Integration of End User Computing Satisfaction and Importance Performance Analysis on Website","authors":"Anggun Barokhah, M. L. Hamzah, Eki Saputra, Fitriani Muttakin","doi":"10.1109/CyberneticsCom55287.2022.9865609","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865609","url":null,"abstract":"Media Website “Diskominfotik” Bengkalis is a form of e-learning developed by the Department of Communication, Information and Statistics which plays an important role in the development of Bengkalis district. The services and features provided are in the form of bengkalis news, activity galleries, important announcements, activity videos, public information and activity agendas. This study is based on the fact that users are dissatisfied with the services provided by the Bengkalis Diskominfotik website, such as the lack of updated information that users need. The aim of this study was to measure the level of satisfaction of website users using the EUCS method with five perspectives, namely content, accuracy, format, ease of use, and timeliness and the IPA method to find out the attributes that are important to improve or need to be interpreted in the form of a matrix. The results of this study indicated that all attributes in terms of importance had the category of satisfied and quite satisfied, and the performance attribute was also in the category of satisfied and quite satisfied. namely the variable content, accuracy, ease of use, with the category satisfied, while the format with the category quite satisfied.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Allocation Based LSTM-FCN in D2D Underlaying with Multi-Cell Cellular Network 基于功率分配的LSTM-FCN多蜂窝网络D2D底层
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865324
Astri Wulandari, Arfianto Fahmi, N. Adriansyah
Device-to-Device (D2D) communication is one of the key technologies to achieving higher speeds, lower latency, and less energy. D2D communication is direct link communication between two communication devices, meaning that communication can occur without going through the base station. However, because communication occurs without going through the base station and D2D users do not have their resources, D2D users simultaneously use the resources owned by Cellular User Equipment (CUE) to communicate and cause interference. Power allocation is optimized to mitigate the interference between D2D users and CUEs and maximize the system's overall sum rate. The traditional power allocation scheme in D2D communication still has problems related to the efficiency of the allocation, coordination of interference, and limitations for operating in real-time systems. This work focuses on designing the Long Short Term Memory with Fully Convolutional Network (LSTM-FCN) algorithm suitable for the power control problem on a D2D underlay communication system with an uplink-side multi-cell scheme. The simulation results show that enhancement of CUE can increase the system's sum rate and energy efficiency. At the same time, enhancement of the D2D pair can also increase the sum rate but decrease energy efficiency. Both LSTM-FCN, LSTM, and FCN can approximate the performance of the conventional scheme (CA-based algorithm). Besides that, LSTM-FCN gets the smallest time complexity compared to the other two algorithms and gets the closest performance to CA in both scenarios above 97% accuracy.
设备到设备(Device-to-Device, D2D)通信是实现更高速度、更低延迟和更少能耗的关键技术之一。D2D通信是两个通信设备之间的直接链路通信,这意味着通信可以不经过基站进行。但是,由于通信不经过基站,D2D用户没有自己的资源,D2D用户同时使用蜂窝用户设备(CUE)拥有的资源进行通信,造成干扰。优化了功率分配,以减轻D2D用户和cue之间的干扰,并最大化系统的总体和速率。在D2D通信中,传统的功率分配方案仍然存在分配效率、干扰协调以及在实时系统中运行的局限性等问题。本文研究了一种基于全卷积网络的长短期记忆(LSTM-FCN)算法,该算法适用于具有上行链路侧多单元方案的D2D底层通信系统的功率控制问题。仿真结果表明,增强CUE可以提高系统的和速率和能效。同时,增强D2D对也可以提高和速率,但降低能量效率。LSTM-FCN、LSTM和FCN都可以近似于传统方案(基于ca的算法)的性能。此外,与其他两种算法相比,LSTM-FCN获得了最小的时间复杂度,并且在准确率超过97%的两种场景下都获得了最接近CA的性能。
{"title":"Power Allocation Based LSTM-FCN in D2D Underlaying with Multi-Cell Cellular Network","authors":"Astri Wulandari, Arfianto Fahmi, N. Adriansyah","doi":"10.1109/CyberneticsCom55287.2022.9865324","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865324","url":null,"abstract":"Device-to-Device (D2D) communication is one of the key technologies to achieving higher speeds, lower latency, and less energy. D2D communication is direct link communication between two communication devices, meaning that communication can occur without going through the base station. However, because communication occurs without going through the base station and D2D users do not have their resources, D2D users simultaneously use the resources owned by Cellular User Equipment (CUE) to communicate and cause interference. Power allocation is optimized to mitigate the interference between D2D users and CUEs and maximize the system's overall sum rate. The traditional power allocation scheme in D2D communication still has problems related to the efficiency of the allocation, coordination of interference, and limitations for operating in real-time systems. This work focuses on designing the Long Short Term Memory with Fully Convolutional Network (LSTM-FCN) algorithm suitable for the power control problem on a D2D underlay communication system with an uplink-side multi-cell scheme. The simulation results show that enhancement of CUE can increase the system's sum rate and energy efficiency. At the same time, enhancement of the D2D pair can also increase the sum rate but decrease energy efficiency. Both LSTM-FCN, LSTM, and FCN can approximate the performance of the conventional scheme (CA-based algorithm). Besides that, LSTM-FCN gets the smallest time complexity compared to the other two algorithms and gets the closest performance to CA in both scenarios above 97% accuracy.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Electroencephalography Electrode Selection for Motor Imagery Application 运动图像应用的脑电图电极选择方法
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865463
M. Riyadi, Oltfaz Rabakhir Rane, Afandi Amir, T. Prakoso, I. Setiawan
Brain-computer interface (BCI) technology is commonly used to describe the brain signal activity non-invasively. The development of EEG devices which is used to record brain activity continues to be carried out, both in terms of accuracy, suitability, computation, and cost. However, the complexity arises with increased electrode numbers. In some studies, minimizing the number of electrodes can be a solution to reduce computational time, cost, and the shape of the EEG device, without compromising the level of accuracy. By choosing particular electrodes which are highly related to the activity, the electrode usage can be reduced. This study used correlation coefficient method which is proposed to determine the best electrode pairs. Moreover, the electrodes which have similar features is eliminated. Based on the experimental and test results, it showed that the results were very good, where the average accuracy and F1 Score was increasing by 2% and 4% compared to the use of all electrodes, this increasing was followed by a decreasing in computation time with an average decreasing in debugging time by 35%.
脑机接口(BCI)技术是一种常用的无创描述脑信号活动的技术。用于记录大脑活动的脑电图设备的发展仍在继续,无论是在准确性,适用性,计算和成本方面。然而,复杂性随着电极数量的增加而增加。在一些研究中,最小化电极的数量可以在不影响准确性的情况下减少计算时间、成本和EEG设备的形状。通过选择与活性高度相关的特定电极,可以减少电极的使用。本研究采用相关系数法确定最佳电极对。此外,消除了具有相似特征的电极。实验和测试结果表明,与使用所有电极相比,结果非常好,其中平均精度和F1分数分别提高了2%和4%,增加之后计算时间减少,调试时间平均减少了35%。
{"title":"Method of Electroencephalography Electrode Selection for Motor Imagery Application","authors":"M. Riyadi, Oltfaz Rabakhir Rane, Afandi Amir, T. Prakoso, I. Setiawan","doi":"10.1109/CyberneticsCom55287.2022.9865463","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865463","url":null,"abstract":"Brain-computer interface (BCI) technology is commonly used to describe the brain signal activity non-invasively. The development of EEG devices which is used to record brain activity continues to be carried out, both in terms of accuracy, suitability, computation, and cost. However, the complexity arises with increased electrode numbers. In some studies, minimizing the number of electrodes can be a solution to reduce computational time, cost, and the shape of the EEG device, without compromising the level of accuracy. By choosing particular electrodes which are highly related to the activity, the electrode usage can be reduced. This study used correlation coefficient method which is proposed to determine the best electrode pairs. Moreover, the electrodes which have similar features is eliminated. Based on the experimental and test results, it showed that the results were very good, where the average accuracy and F1 Score was increasing by 2% and 4% compared to the use of all electrodes, this increasing was followed by a decreasing in computation time with an average decreasing in debugging time by 35%.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome Message from General Chair The 6th Cyberneticscom 2022 第六届cyberticcom 2022大会主席致欢迎辞
Pub Date : 2022-06-16 DOI: 10.1109/cyberneticscom55287.2022.9865555
Arfianto Fahmi
{"title":"Welcome Message from General Chair The 6th Cyberneticscom 2022","authors":"Arfianto Fahmi","doi":"10.1109/cyberneticscom55287.2022.9865555","DOIUrl":"https://doi.org/10.1109/cyberneticscom55287.2022.9865555","url":null,"abstract":"","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114342651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Maturity Assessment Design Using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002 使用NISTCSF, CIS CONTROLS v8和ISO/IEC 27002进行网络安全成熟度评估设计
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865640
Ivan Bashofi, Muhammad Salman
Cyberspace was created by the development of Information and Communication Technology (ICT). This makes it easier to access, manage information faster and more accurately, and improve the efficiency of performing activities and achieving business goals. On the other hand, the higher the usage of information technology, the higher the potential for organizational security incident gaps and cybercrime. Addressing this issue requires security standards that are appropriate and meet the requirements for organizations to know the maturity of cybersecurity. XYZ Organization is one of the government instances managing Indonesia's critical infrastructures. Although some international security standards have been implemented, the results of preparing for information security management are not yet optimal. Analysis of the NIST, CIS Controls v8, and ISO27002 standards was performed in this research. In addition, the analysis results are used as resources to create a cybersecurity maturity framework through the three standard approaches that underlie ICT management. And for the result, the proposed concepts of the 21 integrated cybersecurity categories are expected to become an asset in terms of XYZ organization's ICT management performance.
网络空间是信息通信技术(ICT)发展的产物。这使得更容易访问、更快速、更准确地管理信息,并提高执行活动和实现业务目标的效率。另一方面,信息技术的使用率越高,组织安全事件漏洞和网络犯罪的可能性就越高。解决这个问题需要适当的安全标准,并满足组织了解网络安全成熟度的需求。XYZ组织是管理印度尼西亚关键基础设施的政府实例之一。虽然已经实施了一些国际安全标准,但信息安全管理的准备结果还不是最理想的。本研究分析了NIST、CIS Controls v8和ISO27002标准。此外,分析结果被用作资源,通过作为ICT管理基础的三种标准方法创建网络安全成熟度框架。因此,21个综合网络安全类别的拟议概念有望成为XYZ组织的ICT管理绩效方面的资产。
{"title":"Cybersecurity Maturity Assessment Design Using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002","authors":"Ivan Bashofi, Muhammad Salman","doi":"10.1109/CyberneticsCom55287.2022.9865640","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865640","url":null,"abstract":"Cyberspace was created by the development of Information and Communication Technology (ICT). This makes it easier to access, manage information faster and more accurately, and improve the efficiency of performing activities and achieving business goals. On the other hand, the higher the usage of information technology, the higher the potential for organizational security incident gaps and cybercrime. Addressing this issue requires security standards that are appropriate and meet the requirements for organizations to know the maturity of cybersecurity. XYZ Organization is one of the government instances managing Indonesia's critical infrastructures. Although some international security standards have been implemented, the results of preparing for information security management are not yet optimal. Analysis of the NIST, CIS Controls v8, and ISO27002 standards was performed in this research. In addition, the analysis results are used as resources to create a cybersecurity maturity framework through the three standard approaches that underlie ICT management. And for the result, the proposed concepts of the 21 integrated cybersecurity categories are expected to become an asset in terms of XYZ organization's ICT management performance.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Skeletal-based Classification for Human Activity Recognition 基于骨骼的人体活动识别分类
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865354
Agung Suhendar, Tri Ayuningsih, S. Suyanto
Human activity recognition (HAR) is critical for determining human interactions and interpersonal relationships. Among the various classification techniques, two things become the main focus of HAR, namely the type of activity and its localization. Most of the tasks in HAR involve identifying a human scene from a series of frames in a video, where the subject being monitored is free to perform an activity. For some of the current HAR approaches, 3D sensors are used as input extractors for the skeleton/body pose of the subject being monitored. It is much more precise than using only 2D information obtained from conventional cameras. Of course, the use of 3D sensors is a significant limitation for implementing video-based surveillance systems. In this research, we use the Deep learning OpenPose 3D method as a substitute for 3D sensors that can estimate the 3D frame/pose of the subject's body identified from conventional camera 2D input sources. It is then combined with other machine learning methods for the activity classification process from the obtained 3D framework. Classifiers that can be used include Support Vector Machine (SVM), Neural Network (NN), Long short-term memory (LSTM), and Transformer. Thus, HAR can be applied flexibly in various scopes of supervision without the help of 3D sensors. The experiment results inform that Transformer is the best in accuracy while SVM is in speed.
人类活动识别(HAR)是确定人类互动和人际关系的关键。在各种分类技术中,有两件事成为HAR的主要焦点,即活动类型及其定位。HAR中的大多数任务涉及从视频中的一系列帧中识别人类场景,其中被监控的主体可以自由地执行活动。对于目前的一些HAR方法,3D传感器被用作被监测对象的骨骼/身体姿势的输入提取器。它比仅使用从传统相机获得的二维信息精确得多。当然,3D传感器的使用是实现基于视频的监控系统的一个重大限制。在本研究中,我们使用深度学习OpenPose 3D方法作为3D传感器的替代品,可以估计从传统相机2D输入源识别的受试者身体的3D帧/姿势。然后将其与其他机器学习方法相结合,从获得的3D框架中进行活动分类过程。可以使用的分类器包括支持向量机(SVM)、神经网络(NN)、长短期记忆(LSTM)和Transformer。因此,无需借助3D传感器,HAR可以灵活地应用于各种监管范围。实验结果表明,变压器在精度上是最好的,而SVM在速度上是最好的。
{"title":"Skeletal-based Classification for Human Activity Recognition","authors":"Agung Suhendar, Tri Ayuningsih, S. Suyanto","doi":"10.1109/CyberneticsCom55287.2022.9865354","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865354","url":null,"abstract":"Human activity recognition (HAR) is critical for determining human interactions and interpersonal relationships. Among the various classification techniques, two things become the main focus of HAR, namely the type of activity and its localization. Most of the tasks in HAR involve identifying a human scene from a series of frames in a video, where the subject being monitored is free to perform an activity. For some of the current HAR approaches, 3D sensors are used as input extractors for the skeleton/body pose of the subject being monitored. It is much more precise than using only 2D information obtained from conventional cameras. Of course, the use of 3D sensors is a significant limitation for implementing video-based surveillance systems. In this research, we use the Deep learning OpenPose 3D method as a substitute for 3D sensors that can estimate the 3D frame/pose of the subject's body identified from conventional camera 2D input sources. It is then combined with other machine learning methods for the activity classification process from the obtained 3D framework. Classifiers that can be used include Support Vector Machine (SVM), Neural Network (NN), Long short-term memory (LSTM), and Transformer. Thus, HAR can be applied flexibly in various scopes of supervision without the help of 3D sensors. The experiment results inform that Transformer is the best in accuracy while SVM is in speed.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation of Expansive Soil and Road Pavement Conditions Using Data Mining from GIS Portal 基于GIS Portal数据挖掘的膨胀土与道路路面状况相关性研究
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865244
A. Suraji, Fitri Marisa, Candra Aditya, Faqih Rofii, A. Sudjianto, R. Riman
Expansive soil has a fairly high shrinkage rate and will affect the strength of the road pavement structure. This paper aims to analyze the condition of expansive soil associated with road pavement damage. The method of collecting road damage data is done by data mining from the GIS portal database owned by Bina Marga. Meanwhile, data on soil conditions was taken from the portal belonging to the Geological Agency. The analytical method used is the statistical approach t- Test - Paired Two Sample for Means. The results of the study show that there is a correlation between expansive soil conditions and road damage. Expansive soil has a significant effect on road damage.
膨胀土具有较高的收缩率,会影响道路路面结构的强度。本文旨在分析与道路路面损伤相关的膨胀土状况。收集道路损伤数据的方法是通过对Bina Marga拥有的GIS门户数据库进行数据挖掘。与此同时,土壤状况的数据是从属于地质局的门户网站上获取的。使用的分析方法是统计方法t-检验-配对双样本均值。研究结果表明,膨胀土条件与道路破坏存在一定的相关性。膨胀土对道路破坏有显著影响。
{"title":"Correlation of Expansive Soil and Road Pavement Conditions Using Data Mining from GIS Portal","authors":"A. Suraji, Fitri Marisa, Candra Aditya, Faqih Rofii, A. Sudjianto, R. Riman","doi":"10.1109/CyberneticsCom55287.2022.9865244","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865244","url":null,"abstract":"Expansive soil has a fairly high shrinkage rate and will affect the strength of the road pavement structure. This paper aims to analyze the condition of expansive soil associated with road pavement damage. The method of collecting road damage data is done by data mining from the GIS portal database owned by Bina Marga. Meanwhile, data on soil conditions was taken from the portal belonging to the Geological Agency. The analytical method used is the statistical approach t- Test - Paired Two Sample for Means. The results of the study show that there is a correlation between expansive soil conditions and road damage. Expansive soil has a significant effect on road damage.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132903584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Epileptic Seizure Detection Using Machine Learning and Deep Learning Method 利用机器学习和深度学习方法检测癫痫发作
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865313
A. Eviyanti, Ahmad Saikhu, C. Fatichah
Seizures are a common symptom of epilepsy, a nervous system disease. Epilepsy can be detected with an Electroencephalogram (EEG) signal that records brain nerve activity. Visual observations cannot be done on a routine basis because the EEG signal has a large volume and high dimensions, so a method for dimension reduction is needed to maintain signal information. Appropriate features should be selected to reduce computational complexity and classification time in detecting epileptic seizures. This study compares the performance of Machine Learning and Deep Learning models to detect epileptic seizures to get the best performing model. The feature extraction process using Discrete Wavelet Transform (DWT) taking feature values, namely maximum, minimum, standard deviation, mean, median, and energy. Furthermore, feature selection uses correlation variables, namely removing uncorrelated variables using threshold variations. The improvement of this study is to use six features, namely the maximum, minimum, standard deviation, mean, median, and energy values, as input values in the classification process. Non-seizure signals and epileptic seizures were classified using Machine Learning: Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forest (RF), Decision Tree (DT), and Deep Learning: Long Short-Term Memory (LSTM). The trials used three variations of datasets, namely dataset 1: 96 signals, dataset 134 signals, and dataset 3: 182 signals. Nine different classification experiments were conducted using four performance evaluation indicators: accuracy, precision, recall, and F1-Score. Based on the test results, the model with the best performance is the SVM method with 100% accuracy, 100% precision, 100% recall, and 100% f1-score.
癫痫发作是癫痫的常见症状,癫痫是一种神经系统疾病。癫痫可以通过记录脑神经活动的脑电图(EEG)信号来检测。由于脑电信号体积大、维数高,无法进行常规的视觉观察,因此需要一种降维方法来保持信号信息。在检测癫痫发作时,应选择适当的特征以减少计算复杂度和分类时间。本研究比较了机器学习和深度学习模型检测癫痫发作的性能,以获得性能最佳的模型。特征提取过程使用离散小波变换(DWT)取特征值,即最大值、最小值、标准差、平均值、中位数和能量。此外,特征选择使用相关变量,即使用阈值变化去除不相关变量。本研究的改进之处在于使用最大值、最小值、标准差、平均值、中位数和能量值六个特征作为分类过程的输入值。非发作信号和癫痫发作使用机器学习分类:支持向量机(SVM)、k近邻(KNN)、随机森林(RF)、决策树(DT)和深度学习:长短期记忆(LSTM)。试验使用了三种不同的数据集,即数据集1:96信号,数据集134信号和数据集3:182信号。采用正确率、精密度、召回率和F1-Score 4个性能评价指标进行了9个不同的分类实验。从测试结果来看,性能最好的模型是准确率100%、精密度100%、召回率100%、f1-score 100%的SVM方法。
{"title":"Epileptic Seizure Detection Using Machine Learning and Deep Learning Method","authors":"A. Eviyanti, Ahmad Saikhu, C. Fatichah","doi":"10.1109/CyberneticsCom55287.2022.9865313","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865313","url":null,"abstract":"Seizures are a common symptom of epilepsy, a nervous system disease. Epilepsy can be detected with an Electroencephalogram (EEG) signal that records brain nerve activity. Visual observations cannot be done on a routine basis because the EEG signal has a large volume and high dimensions, so a method for dimension reduction is needed to maintain signal information. Appropriate features should be selected to reduce computational complexity and classification time in detecting epileptic seizures. This study compares the performance of Machine Learning and Deep Learning models to detect epileptic seizures to get the best performing model. The feature extraction process using Discrete Wavelet Transform (DWT) taking feature values, namely maximum, minimum, standard deviation, mean, median, and energy. Furthermore, feature selection uses correlation variables, namely removing uncorrelated variables using threshold variations. The improvement of this study is to use six features, namely the maximum, minimum, standard deviation, mean, median, and energy values, as input values in the classification process. Non-seizure signals and epileptic seizures were classified using Machine Learning: Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forest (RF), Decision Tree (DT), and Deep Learning: Long Short-Term Memory (LSTM). The trials used three variations of datasets, namely dataset 1: 96 signals, dataset 134 signals, and dataset 3: 182 signals. Nine different classification experiments were conducted using four performance evaluation indicators: accuracy, precision, recall, and F1-Score. Based on the test results, the model with the best performance is the SVM method with 100% accuracy, 100% precision, 100% recall, and 100% f1-score.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact on Review Credibility and Trust from Review Solicitation on E-commerce 电子商务中评审征稿对评审可信度和信任度的影响
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865619
Erwin Ardianto Halim, Zahran Fawwaz Muzakir, Marylise Hebrard
It has widely known that Online Customer Reviews have become an integral part of customer decision-making before making online purchases. Sellers and platforms alike develop a strategy to shape reviews profitably under the pretext of increasing sales. Review Solicitation has been used to increase review volume and review valance in the online review platform. Interestingly, while much research is conducted to find the impact of review solicitation on the characteristics of reviews generated, there is not much research done on the perception of customers who have experienced the review solicitation strategy that might pose a problem for parties involved. This study aims to fill the gap of previous studies in finding the answer to what happens to the review credibility and Trust from the customer perspective after review solicitation. The research used Sequential Equation Modeling (SEM) process from 112 data obtained using Purposive sampling with online respondents around the Jabodetabek area in Indonesia in March 2022. There are five variables (Review Solicitation Awareness, Review Solicitation experience, Review Credibility, Trust, and Purchase Intention) with four hypotheses in this study. This study found that customers' Reviews Solicitation Experience significantly influences review credibility. At the same time, customers' Reviews of Solicitation Awareness significantly influence Trust. Then, Trust significantly influences Purchase Intention.
众所周知,在线客户评论已经成为客户在线购买决策的重要组成部分。卖家和平台都制定了一种策略,在增加销量的借口下,塑造评论以盈利。在网上评审平台中,采用评审征集的方式来增加评审量和评审价值。有趣的是,虽然进行了许多研究来发现评论征求对所生成评论特征的影响,但对经历过评论征求策略的客户的感知(可能对相关方构成问题)的研究并不多。本研究旨在填补以往研究的空白,从顾客的角度寻找评论邀请后评论可信度和信任度的变化。该研究使用顺序方程模型(SEM)处理了2022年3月在印度尼西亚Jabodetabek地区附近通过有目的抽样获得的112个数据。本研究共设5个变量(评邀意识、评邀经验、评邀可信度、信任和购买意愿),并设4个假设。本研究发现,顾客评论邀约经验显著影响评论可信度。同时,客户对邀约意识的评价显著影响信任。其次,信任显著影响购买意愿。
{"title":"The Impact on Review Credibility and Trust from Review Solicitation on E-commerce","authors":"Erwin Ardianto Halim, Zahran Fawwaz Muzakir, Marylise Hebrard","doi":"10.1109/CyberneticsCom55287.2022.9865619","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865619","url":null,"abstract":"It has widely known that Online Customer Reviews have become an integral part of customer decision-making before making online purchases. Sellers and platforms alike develop a strategy to shape reviews profitably under the pretext of increasing sales. Review Solicitation has been used to increase review volume and review valance in the online review platform. Interestingly, while much research is conducted to find the impact of review solicitation on the characteristics of reviews generated, there is not much research done on the perception of customers who have experienced the review solicitation strategy that might pose a problem for parties involved. This study aims to fill the gap of previous studies in finding the answer to what happens to the review credibility and Trust from the customer perspective after review solicitation. The research used Sequential Equation Modeling (SEM) process from 112 data obtained using Purposive sampling with online respondents around the Jabodetabek area in Indonesia in March 2022. There are five variables (Review Solicitation Awareness, Review Solicitation experience, Review Credibility, Trust, and Purchase Intention) with four hypotheses in this study. This study found that customers' Reviews Solicitation Experience significantly influences review credibility. At the same time, customers' Reviews of Solicitation Awareness significantly influence Trust. Then, Trust significantly influences Purchase Intention.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126246993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1