首页 > 最新文献

2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)最新文献

英文 中文
Power Allocation Based LSTM-FCN in D2D Underlaying with Multi-Cell Cellular Network 基于功率分配的LSTM-FCN多蜂窝网络D2D底层
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865324
Astri Wulandari, Arfianto Fahmi, N. Adriansyah
Device-to-Device (D2D) communication is one of the key technologies to achieving higher speeds, lower latency, and less energy. D2D communication is direct link communication between two communication devices, meaning that communication can occur without going through the base station. However, because communication occurs without going through the base station and D2D users do not have their resources, D2D users simultaneously use the resources owned by Cellular User Equipment (CUE) to communicate and cause interference. Power allocation is optimized to mitigate the interference between D2D users and CUEs and maximize the system's overall sum rate. The traditional power allocation scheme in D2D communication still has problems related to the efficiency of the allocation, coordination of interference, and limitations for operating in real-time systems. This work focuses on designing the Long Short Term Memory with Fully Convolutional Network (LSTM-FCN) algorithm suitable for the power control problem on a D2D underlay communication system with an uplink-side multi-cell scheme. The simulation results show that enhancement of CUE can increase the system's sum rate and energy efficiency. At the same time, enhancement of the D2D pair can also increase the sum rate but decrease energy efficiency. Both LSTM-FCN, LSTM, and FCN can approximate the performance of the conventional scheme (CA-based algorithm). Besides that, LSTM-FCN gets the smallest time complexity compared to the other two algorithms and gets the closest performance to CA in both scenarios above 97% accuracy.
设备到设备(Device-to-Device, D2D)通信是实现更高速度、更低延迟和更少能耗的关键技术之一。D2D通信是两个通信设备之间的直接链路通信,这意味着通信可以不经过基站进行。但是,由于通信不经过基站,D2D用户没有自己的资源,D2D用户同时使用蜂窝用户设备(CUE)拥有的资源进行通信,造成干扰。优化了功率分配,以减轻D2D用户和cue之间的干扰,并最大化系统的总体和速率。在D2D通信中,传统的功率分配方案仍然存在分配效率、干扰协调以及在实时系统中运行的局限性等问题。本文研究了一种基于全卷积网络的长短期记忆(LSTM-FCN)算法,该算法适用于具有上行链路侧多单元方案的D2D底层通信系统的功率控制问题。仿真结果表明,增强CUE可以提高系统的和速率和能效。同时,增强D2D对也可以提高和速率,但降低能量效率。LSTM-FCN、LSTM和FCN都可以近似于传统方案(基于ca的算法)的性能。此外,与其他两种算法相比,LSTM-FCN获得了最小的时间复杂度,并且在准确率超过97%的两种场景下都获得了最接近CA的性能。
{"title":"Power Allocation Based LSTM-FCN in D2D Underlaying with Multi-Cell Cellular Network","authors":"Astri Wulandari, Arfianto Fahmi, N. Adriansyah","doi":"10.1109/CyberneticsCom55287.2022.9865324","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865324","url":null,"abstract":"Device-to-Device (D2D) communication is one of the key technologies to achieving higher speeds, lower latency, and less energy. D2D communication is direct link communication between two communication devices, meaning that communication can occur without going through the base station. However, because communication occurs without going through the base station and D2D users do not have their resources, D2D users simultaneously use the resources owned by Cellular User Equipment (CUE) to communicate and cause interference. Power allocation is optimized to mitigate the interference between D2D users and CUEs and maximize the system's overall sum rate. The traditional power allocation scheme in D2D communication still has problems related to the efficiency of the allocation, coordination of interference, and limitations for operating in real-time systems. This work focuses on designing the Long Short Term Memory with Fully Convolutional Network (LSTM-FCN) algorithm suitable for the power control problem on a D2D underlay communication system with an uplink-side multi-cell scheme. The simulation results show that enhancement of CUE can increase the system's sum rate and energy efficiency. At the same time, enhancement of the D2D pair can also increase the sum rate but decrease energy efficiency. Both LSTM-FCN, LSTM, and FCN can approximate the performance of the conventional scheme (CA-based algorithm). Besides that, LSTM-FCN gets the smallest time complexity compared to the other two algorithms and gets the closest performance to CA in both scenarios above 97% accuracy.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact on Review Credibility and Trust from Review Solicitation on E-commerce 电子商务中评审征稿对评审可信度和信任度的影响
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865619
Erwin Ardianto Halim, Zahran Fawwaz Muzakir, Marylise Hebrard
It has widely known that Online Customer Reviews have become an integral part of customer decision-making before making online purchases. Sellers and platforms alike develop a strategy to shape reviews profitably under the pretext of increasing sales. Review Solicitation has been used to increase review volume and review valance in the online review platform. Interestingly, while much research is conducted to find the impact of review solicitation on the characteristics of reviews generated, there is not much research done on the perception of customers who have experienced the review solicitation strategy that might pose a problem for parties involved. This study aims to fill the gap of previous studies in finding the answer to what happens to the review credibility and Trust from the customer perspective after review solicitation. The research used Sequential Equation Modeling (SEM) process from 112 data obtained using Purposive sampling with online respondents around the Jabodetabek area in Indonesia in March 2022. There are five variables (Review Solicitation Awareness, Review Solicitation experience, Review Credibility, Trust, and Purchase Intention) with four hypotheses in this study. This study found that customers' Reviews Solicitation Experience significantly influences review credibility. At the same time, customers' Reviews of Solicitation Awareness significantly influence Trust. Then, Trust significantly influences Purchase Intention.
众所周知,在线客户评论已经成为客户在线购买决策的重要组成部分。卖家和平台都制定了一种策略,在增加销量的借口下,塑造评论以盈利。在网上评审平台中,采用评审征集的方式来增加评审量和评审价值。有趣的是,虽然进行了许多研究来发现评论征求对所生成评论特征的影响,但对经历过评论征求策略的客户的感知(可能对相关方构成问题)的研究并不多。本研究旨在填补以往研究的空白,从顾客的角度寻找评论邀请后评论可信度和信任度的变化。该研究使用顺序方程模型(SEM)处理了2022年3月在印度尼西亚Jabodetabek地区附近通过有目的抽样获得的112个数据。本研究共设5个变量(评邀意识、评邀经验、评邀可信度、信任和购买意愿),并设4个假设。本研究发现,顾客评论邀约经验显著影响评论可信度。同时,客户对邀约意识的评价显著影响信任。其次,信任显著影响购买意愿。
{"title":"The Impact on Review Credibility and Trust from Review Solicitation on E-commerce","authors":"Erwin Ardianto Halim, Zahran Fawwaz Muzakir, Marylise Hebrard","doi":"10.1109/CyberneticsCom55287.2022.9865619","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865619","url":null,"abstract":"It has widely known that Online Customer Reviews have become an integral part of customer decision-making before making online purchases. Sellers and platforms alike develop a strategy to shape reviews profitably under the pretext of increasing sales. Review Solicitation has been used to increase review volume and review valance in the online review platform. Interestingly, while much research is conducted to find the impact of review solicitation on the characteristics of reviews generated, there is not much research done on the perception of customers who have experienced the review solicitation strategy that might pose a problem for parties involved. This study aims to fill the gap of previous studies in finding the answer to what happens to the review credibility and Trust from the customer perspective after review solicitation. The research used Sequential Equation Modeling (SEM) process from 112 data obtained using Purposive sampling with online respondents around the Jabodetabek area in Indonesia in March 2022. There are five variables (Review Solicitation Awareness, Review Solicitation experience, Review Credibility, Trust, and Purchase Intention) with four hypotheses in this study. This study found that customers' Reviews Solicitation Experience significantly influences review credibility. At the same time, customers' Reviews of Solicitation Awareness significantly influence Trust. Then, Trust significantly influences Purchase Intention.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126246993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperparameter Optimization on CNN Using Hyperband on Tomato Leaf Disease Classification 基于CNN超带的番茄叶片病害分类超参数优化
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865317
Ardiansyah Kamal Alkaff, B. Prasetiyo
Convolutional Neural Network (CNN) has been successfully applied to image classification, one of which is plant or leaf disease. However, choosing the optimal architecture and hyperparameters is a challenge in its implementation. The purpose of this study was to optimize the Convolutional Neural Network (CNN) hyperparameter on the classification of tomato leaf diseases. In this research, optimization of hyperparameter Convolutional Neural Network (CNN) using Hyperband on Tomato Leaf Disease Detection dataset. The dataset consists of 10,000 training data and 1,000 testing data with 10 classes. In the training data, the distribution of the dataset is 80% for training data and 20% for data validation. This study uses the Keras-Tuner library which aims to optimize two hyperparameters, namely the number of dense neurons and the learning rate. The best hyperparameter value resulting from hyperparameter optimization is 128 for the number of dense neurons and 0.001 for the learning rate. The proposed method succeeded in achieving an accuracy value of 95.690% in the training phase and 88.50% in the validation phase. These results were obtained from model training of 50 epochs. In addition, the model testing obtained an accuracy value of 88.60%. Therefore, hyperparameter optimization on Convolutional Neural Network (CNN) using Hyperband can be an alternative in choosing the optimal architecture and hyperparameters.
卷积神经网络(CNN)已经成功地应用于图像分类,其中之一是植物或叶片病害。然而,选择最优的体系结构和超参数是其实现中的一个挑战。本研究的目的是优化卷积神经网络(CNN)超参数在番茄叶病分类中的应用。在本研究中,利用Hyperband对番茄叶病检测数据集进行了超参数卷积神经网络(CNN)的优化。该数据集由10000个训练数据和1000个测试数据组成,共10个类。在训练数据中,数据集的分布80%用于训练数据,20%用于数据验证。本研究使用Keras-Tuner库,旨在优化两个超参数,即密集神经元的数量和学习率。由超参数优化得到的最佳超参数值对于密集神经元的数量为128,对于学习率为0.001。该方法在训练阶段和验证阶段的准确率分别达到95.690%和88.50%。这些结果是通过50个epoch的模型训练得到的。此外,模型测试的准确率达到了88.60%。因此,利用Hyperband对卷积神经网络(CNN)进行超参数优化是选择最优结构和超参数的一种选择。
{"title":"Hyperparameter Optimization on CNN Using Hyperband on Tomato Leaf Disease Classification","authors":"Ardiansyah Kamal Alkaff, B. Prasetiyo","doi":"10.1109/CyberneticsCom55287.2022.9865317","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865317","url":null,"abstract":"Convolutional Neural Network (CNN) has been successfully applied to image classification, one of which is plant or leaf disease. However, choosing the optimal architecture and hyperparameters is a challenge in its implementation. The purpose of this study was to optimize the Convolutional Neural Network (CNN) hyperparameter on the classification of tomato leaf diseases. In this research, optimization of hyperparameter Convolutional Neural Network (CNN) using Hyperband on Tomato Leaf Disease Detection dataset. The dataset consists of 10,000 training data and 1,000 testing data with 10 classes. In the training data, the distribution of the dataset is 80% for training data and 20% for data validation. This study uses the Keras-Tuner library which aims to optimize two hyperparameters, namely the number of dense neurons and the learning rate. The best hyperparameter value resulting from hyperparameter optimization is 128 for the number of dense neurons and 0.001 for the learning rate. The proposed method succeeded in achieving an accuracy value of 95.690% in the training phase and 88.50% in the validation phase. These results were obtained from model training of 50 epochs. In addition, the model testing obtained an accuracy value of 88.60%. Therefore, hyperparameter optimization on Convolutional Neural Network (CNN) using Hyperband can be an alternative in choosing the optimal architecture and hyperparameters.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Integration of End User Computing Satisfaction and Importance Performance Analysis on Website 网站终端用户计算满意度与重要性性能分析的集成
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865609
Anggun Barokhah, M. L. Hamzah, Eki Saputra, Fitriani Muttakin
Media Website “Diskominfotik” Bengkalis is a form of e-learning developed by the Department of Communication, Information and Statistics which plays an important role in the development of Bengkalis district. The services and features provided are in the form of bengkalis news, activity galleries, important announcements, activity videos, public information and activity agendas. This study is based on the fact that users are dissatisfied with the services provided by the Bengkalis Diskominfotik website, such as the lack of updated information that users need. The aim of this study was to measure the level of satisfaction of website users using the EUCS method with five perspectives, namely content, accuracy, format, ease of use, and timeliness and the IPA method to find out the attributes that are important to improve or need to be interpreted in the form of a matrix. The results of this study indicated that all attributes in terms of importance had the category of satisfied and quite satisfied, and the performance attribute was also in the category of satisfied and quite satisfied. namely the variable content, accuracy, ease of use, with the category satisfied, while the format with the category quite satisfied.
媒体网站“Diskominfotik”Bengkalis是由通讯、信息和统计部门开发的一种电子学习形式,该部门在Bengkalis地区的发展中发挥着重要作用。提供的服务和功能以bengkalis新闻,活动画廊,重要公告,活动视频,公共信息和活动议程的形式提供。本研究基于用户对Bengkalis Diskominfotik网站提供的服务不满意的事实,例如缺乏用户需要的更新信息。本研究的目的是使用EUCS方法从内容、准确性、格式、易用性和时效性五个角度来衡量网站用户的满意度水平,并使用IPA方法以矩阵的形式找出需要改进或需要解释的重要属性。本研究结果表明,各属性在重要性上均存在满意和比较满意的类别,绩效属性也存在满意和比较满意的类别。即内容可变,准确性高,易用性好,与分类满意,而格式与分类相当满意。
{"title":"An Integration of End User Computing Satisfaction and Importance Performance Analysis on Website","authors":"Anggun Barokhah, M. L. Hamzah, Eki Saputra, Fitriani Muttakin","doi":"10.1109/CyberneticsCom55287.2022.9865609","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865609","url":null,"abstract":"Media Website “Diskominfotik” Bengkalis is a form of e-learning developed by the Department of Communication, Information and Statistics which plays an important role in the development of Bengkalis district. The services and features provided are in the form of bengkalis news, activity galleries, important announcements, activity videos, public information and activity agendas. This study is based on the fact that users are dissatisfied with the services provided by the Bengkalis Diskominfotik website, such as the lack of updated information that users need. The aim of this study was to measure the level of satisfaction of website users using the EUCS method with five perspectives, namely content, accuracy, format, ease of use, and timeliness and the IPA method to find out the attributes that are important to improve or need to be interpreted in the form of a matrix. The results of this study indicated that all attributes in terms of importance had the category of satisfied and quite satisfied, and the performance attribute was also in the category of satisfied and quite satisfied. namely the variable content, accuracy, ease of use, with the category satisfied, while the format with the category quite satisfied.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome Message from General Chair The 6th Cyberneticscom 2022 第六届cyberticcom 2022大会主席致欢迎辞
Pub Date : 2022-06-16 DOI: 10.1109/cyberneticscom55287.2022.9865555
Arfianto Fahmi
{"title":"Welcome Message from General Chair The 6th Cyberneticscom 2022","authors":"Arfianto Fahmi","doi":"10.1109/cyberneticscom55287.2022.9865555","DOIUrl":"https://doi.org/10.1109/cyberneticscom55287.2022.9865555","url":null,"abstract":"","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114342651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of DNA Sequence Classification Using SVM Model with Hyperparameter Tuning Grid Search CV 基于超参数调谐网格搜索的支持向量机DNA序列分类分析
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865624
Iis Setiawan Mangkunegara, P. Purwono
Viruses and bacteria are constantly evolving in the world. Early identification of pathogens is one way that can be used to spread the spread of disease to drug design. DNA sequence classification is an essential aspect of computational biology. Pathogen identification was carried out by comparing data between sequenced genomes with NCBI data. Machine learning technology can classify DNA whose nature is unclear, and the sequence is considered long and challenging to find. The SVM classification model is proposed in this study. The resulting accuracy is still considered not optimal, so optimization is needed. In contrast to previous studies, we used the grid search cv optimization technique on the SVM classification model. Kernel polynomial with 2 degrees is the best parameter recommendation from the grid search cv technique. The accuracy before the optimization is 77%, while it is 90% after optimization. This shows an increase in accuracy of 14% after applying the grid search cv method to DNA sequence classification using the SVM model.
病毒和细菌在世界上不断进化。早期识别病原体是一种可以用来将疾病传播到药物设计的方法。DNA序列分类是计算生物学的一个重要方面。将测序基因组与NCBI数据进行比对,鉴定病原菌。机器学习技术可以对性质不明确的DNA进行分类,而且序列被认为很长,很难找到。本文提出了支持向量机分类模型。结果精度仍然被认为不是最优的,因此需要进行优化。与以往的研究相比,我们在SVM分类模型上使用了网格搜索cv优化技术。2度核多项式是网格搜索cv技术推荐的最佳参数。优化前的准确率为77%,优化后的准确率为90%。这表明,将网格搜索cv方法应用于使用SVM模型的DNA序列分类后,准确率提高了14%。
{"title":"Analysis of DNA Sequence Classification Using SVM Model with Hyperparameter Tuning Grid Search CV","authors":"Iis Setiawan Mangkunegara, P. Purwono","doi":"10.1109/CyberneticsCom55287.2022.9865624","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865624","url":null,"abstract":"Viruses and bacteria are constantly evolving in the world. Early identification of pathogens is one way that can be used to spread the spread of disease to drug design. DNA sequence classification is an essential aspect of computational biology. Pathogen identification was carried out by comparing data between sequenced genomes with NCBI data. Machine learning technology can classify DNA whose nature is unclear, and the sequence is considered long and challenging to find. The SVM classification model is proposed in this study. The resulting accuracy is still considered not optimal, so optimization is needed. In contrast to previous studies, we used the grid search cv optimization technique on the SVM classification model. Kernel polynomial with 2 degrees is the best parameter recommendation from the grid search cv technique. The accuracy before the optimization is 77%, while it is 90% after optimization. This shows an increase in accuracy of 14% after applying the grid search cv method to DNA sequence classification using the SVM model.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124577406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Correlation of Expansive Soil and Road Pavement Conditions Using Data Mining from GIS Portal 基于GIS Portal数据挖掘的膨胀土与道路路面状况相关性研究
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865244
A. Suraji, Fitri Marisa, Candra Aditya, Faqih Rofii, A. Sudjianto, R. Riman
Expansive soil has a fairly high shrinkage rate and will affect the strength of the road pavement structure. This paper aims to analyze the condition of expansive soil associated with road pavement damage. The method of collecting road damage data is done by data mining from the GIS portal database owned by Bina Marga. Meanwhile, data on soil conditions was taken from the portal belonging to the Geological Agency. The analytical method used is the statistical approach t- Test - Paired Two Sample for Means. The results of the study show that there is a correlation between expansive soil conditions and road damage. Expansive soil has a significant effect on road damage.
膨胀土具有较高的收缩率,会影响道路路面结构的强度。本文旨在分析与道路路面损伤相关的膨胀土状况。收集道路损伤数据的方法是通过对Bina Marga拥有的GIS门户数据库进行数据挖掘。与此同时,土壤状况的数据是从属于地质局的门户网站上获取的。使用的分析方法是统计方法t-检验-配对双样本均值。研究结果表明,膨胀土条件与道路破坏存在一定的相关性。膨胀土对道路破坏有显著影响。
{"title":"Correlation of Expansive Soil and Road Pavement Conditions Using Data Mining from GIS Portal","authors":"A. Suraji, Fitri Marisa, Candra Aditya, Faqih Rofii, A. Sudjianto, R. Riman","doi":"10.1109/CyberneticsCom55287.2022.9865244","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865244","url":null,"abstract":"Expansive soil has a fairly high shrinkage rate and will affect the strength of the road pavement structure. This paper aims to analyze the condition of expansive soil associated with road pavement damage. The method of collecting road damage data is done by data mining from the GIS portal database owned by Bina Marga. Meanwhile, data on soil conditions was taken from the portal belonging to the Geological Agency. The analytical method used is the statistical approach t- Test - Paired Two Sample for Means. The results of the study show that there is a correlation between expansive soil conditions and road damage. Expansive soil has a significant effect on road damage.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132903584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cybersecurity Maturity Assessment Design Using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002 使用NISTCSF, CIS CONTROLS v8和ISO/IEC 27002进行网络安全成熟度评估设计
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865640
Ivan Bashofi, Muhammad Salman
Cyberspace was created by the development of Information and Communication Technology (ICT). This makes it easier to access, manage information faster and more accurately, and improve the efficiency of performing activities and achieving business goals. On the other hand, the higher the usage of information technology, the higher the potential for organizational security incident gaps and cybercrime. Addressing this issue requires security standards that are appropriate and meet the requirements for organizations to know the maturity of cybersecurity. XYZ Organization is one of the government instances managing Indonesia's critical infrastructures. Although some international security standards have been implemented, the results of preparing for information security management are not yet optimal. Analysis of the NIST, CIS Controls v8, and ISO27002 standards was performed in this research. In addition, the analysis results are used as resources to create a cybersecurity maturity framework through the three standard approaches that underlie ICT management. And for the result, the proposed concepts of the 21 integrated cybersecurity categories are expected to become an asset in terms of XYZ organization's ICT management performance.
网络空间是信息通信技术(ICT)发展的产物。这使得更容易访问、更快速、更准确地管理信息,并提高执行活动和实现业务目标的效率。另一方面,信息技术的使用率越高,组织安全事件漏洞和网络犯罪的可能性就越高。解决这个问题需要适当的安全标准,并满足组织了解网络安全成熟度的需求。XYZ组织是管理印度尼西亚关键基础设施的政府实例之一。虽然已经实施了一些国际安全标准,但信息安全管理的准备结果还不是最理想的。本研究分析了NIST、CIS Controls v8和ISO27002标准。此外,分析结果被用作资源,通过作为ICT管理基础的三种标准方法创建网络安全成熟度框架。因此,21个综合网络安全类别的拟议概念有望成为XYZ组织的ICT管理绩效方面的资产。
{"title":"Cybersecurity Maturity Assessment Design Using NISTCSF, CIS CONTROLS v8 and ISO/IEC 27002","authors":"Ivan Bashofi, Muhammad Salman","doi":"10.1109/CyberneticsCom55287.2022.9865640","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865640","url":null,"abstract":"Cyberspace was created by the development of Information and Communication Technology (ICT). This makes it easier to access, manage information faster and more accurately, and improve the efficiency of performing activities and achieving business goals. On the other hand, the higher the usage of information technology, the higher the potential for organizational security incident gaps and cybercrime. Addressing this issue requires security standards that are appropriate and meet the requirements for organizations to know the maturity of cybersecurity. XYZ Organization is one of the government instances managing Indonesia's critical infrastructures. Although some international security standards have been implemented, the results of preparing for information security management are not yet optimal. Analysis of the NIST, CIS Controls v8, and ISO27002 standards was performed in this research. In addition, the analysis results are used as resources to create a cybersecurity maturity framework through the three standard approaches that underlie ICT management. And for the result, the proposed concepts of the 21 integrated cybersecurity categories are expected to become an asset in terms of XYZ organization's ICT management performance.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Epileptic Seizure Detection Using Machine Learning and Deep Learning Method 利用机器学习和深度学习方法检测癫痫发作
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865313
A. Eviyanti, Ahmad Saikhu, C. Fatichah
Seizures are a common symptom of epilepsy, a nervous system disease. Epilepsy can be detected with an Electroencephalogram (EEG) signal that records brain nerve activity. Visual observations cannot be done on a routine basis because the EEG signal has a large volume and high dimensions, so a method for dimension reduction is needed to maintain signal information. Appropriate features should be selected to reduce computational complexity and classification time in detecting epileptic seizures. This study compares the performance of Machine Learning and Deep Learning models to detect epileptic seizures to get the best performing model. The feature extraction process using Discrete Wavelet Transform (DWT) taking feature values, namely maximum, minimum, standard deviation, mean, median, and energy. Furthermore, feature selection uses correlation variables, namely removing uncorrelated variables using threshold variations. The improvement of this study is to use six features, namely the maximum, minimum, standard deviation, mean, median, and energy values, as input values in the classification process. Non-seizure signals and epileptic seizures were classified using Machine Learning: Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forest (RF), Decision Tree (DT), and Deep Learning: Long Short-Term Memory (LSTM). The trials used three variations of datasets, namely dataset 1: 96 signals, dataset 134 signals, and dataset 3: 182 signals. Nine different classification experiments were conducted using four performance evaluation indicators: accuracy, precision, recall, and F1-Score. Based on the test results, the model with the best performance is the SVM method with 100% accuracy, 100% precision, 100% recall, and 100% f1-score.
癫痫发作是癫痫的常见症状,癫痫是一种神经系统疾病。癫痫可以通过记录脑神经活动的脑电图(EEG)信号来检测。由于脑电信号体积大、维数高,无法进行常规的视觉观察,因此需要一种降维方法来保持信号信息。在检测癫痫发作时,应选择适当的特征以减少计算复杂度和分类时间。本研究比较了机器学习和深度学习模型检测癫痫发作的性能,以获得性能最佳的模型。特征提取过程使用离散小波变换(DWT)取特征值,即最大值、最小值、标准差、平均值、中位数和能量。此外,特征选择使用相关变量,即使用阈值变化去除不相关变量。本研究的改进之处在于使用最大值、最小值、标准差、平均值、中位数和能量值六个特征作为分类过程的输入值。非发作信号和癫痫发作使用机器学习分类:支持向量机(SVM)、k近邻(KNN)、随机森林(RF)、决策树(DT)和深度学习:长短期记忆(LSTM)。试验使用了三种不同的数据集,即数据集1:96信号,数据集134信号和数据集3:182信号。采用正确率、精密度、召回率和F1-Score 4个性能评价指标进行了9个不同的分类实验。从测试结果来看,性能最好的模型是准确率100%、精密度100%、召回率100%、f1-score 100%的SVM方法。
{"title":"Epileptic Seizure Detection Using Machine Learning and Deep Learning Method","authors":"A. Eviyanti, Ahmad Saikhu, C. Fatichah","doi":"10.1109/CyberneticsCom55287.2022.9865313","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865313","url":null,"abstract":"Seizures are a common symptom of epilepsy, a nervous system disease. Epilepsy can be detected with an Electroencephalogram (EEG) signal that records brain nerve activity. Visual observations cannot be done on a routine basis because the EEG signal has a large volume and high dimensions, so a method for dimension reduction is needed to maintain signal information. Appropriate features should be selected to reduce computational complexity and classification time in detecting epileptic seizures. This study compares the performance of Machine Learning and Deep Learning models to detect epileptic seizures to get the best performing model. The feature extraction process using Discrete Wavelet Transform (DWT) taking feature values, namely maximum, minimum, standard deviation, mean, median, and energy. Furthermore, feature selection uses correlation variables, namely removing uncorrelated variables using threshold variations. The improvement of this study is to use six features, namely the maximum, minimum, standard deviation, mean, median, and energy values, as input values in the classification process. Non-seizure signals and epileptic seizures were classified using Machine Learning: Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forest (RF), Decision Tree (DT), and Deep Learning: Long Short-Term Memory (LSTM). The trials used three variations of datasets, namely dataset 1: 96 signals, dataset 134 signals, and dataset 3: 182 signals. Nine different classification experiments were conducted using four performance evaluation indicators: accuracy, precision, recall, and F1-Score. Based on the test results, the model with the best performance is the SVM method with 100% accuracy, 100% precision, 100% recall, and 100% f1-score.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skeletal-based Classification for Human Activity Recognition 基于骨骼的人体活动识别分类
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865354
Agung Suhendar, Tri Ayuningsih, S. Suyanto
Human activity recognition (HAR) is critical for determining human interactions and interpersonal relationships. Among the various classification techniques, two things become the main focus of HAR, namely the type of activity and its localization. Most of the tasks in HAR involve identifying a human scene from a series of frames in a video, where the subject being monitored is free to perform an activity. For some of the current HAR approaches, 3D sensors are used as input extractors for the skeleton/body pose of the subject being monitored. It is much more precise than using only 2D information obtained from conventional cameras. Of course, the use of 3D sensors is a significant limitation for implementing video-based surveillance systems. In this research, we use the Deep learning OpenPose 3D method as a substitute for 3D sensors that can estimate the 3D frame/pose of the subject's body identified from conventional camera 2D input sources. It is then combined with other machine learning methods for the activity classification process from the obtained 3D framework. Classifiers that can be used include Support Vector Machine (SVM), Neural Network (NN), Long short-term memory (LSTM), and Transformer. Thus, HAR can be applied flexibly in various scopes of supervision without the help of 3D sensors. The experiment results inform that Transformer is the best in accuracy while SVM is in speed.
人类活动识别(HAR)是确定人类互动和人际关系的关键。在各种分类技术中,有两件事成为HAR的主要焦点,即活动类型及其定位。HAR中的大多数任务涉及从视频中的一系列帧中识别人类场景,其中被监控的主体可以自由地执行活动。对于目前的一些HAR方法,3D传感器被用作被监测对象的骨骼/身体姿势的输入提取器。它比仅使用从传统相机获得的二维信息精确得多。当然,3D传感器的使用是实现基于视频的监控系统的一个重大限制。在本研究中,我们使用深度学习OpenPose 3D方法作为3D传感器的替代品,可以估计从传统相机2D输入源识别的受试者身体的3D帧/姿势。然后将其与其他机器学习方法相结合,从获得的3D框架中进行活动分类过程。可以使用的分类器包括支持向量机(SVM)、神经网络(NN)、长短期记忆(LSTM)和Transformer。因此,无需借助3D传感器,HAR可以灵活地应用于各种监管范围。实验结果表明,变压器在精度上是最好的,而SVM在速度上是最好的。
{"title":"Skeletal-based Classification for Human Activity Recognition","authors":"Agung Suhendar, Tri Ayuningsih, S. Suyanto","doi":"10.1109/CyberneticsCom55287.2022.9865354","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865354","url":null,"abstract":"Human activity recognition (HAR) is critical for determining human interactions and interpersonal relationships. Among the various classification techniques, two things become the main focus of HAR, namely the type of activity and its localization. Most of the tasks in HAR involve identifying a human scene from a series of frames in a video, where the subject being monitored is free to perform an activity. For some of the current HAR approaches, 3D sensors are used as input extractors for the skeleton/body pose of the subject being monitored. It is much more precise than using only 2D information obtained from conventional cameras. Of course, the use of 3D sensors is a significant limitation for implementing video-based surveillance systems. In this research, we use the Deep learning OpenPose 3D method as a substitute for 3D sensors that can estimate the 3D frame/pose of the subject's body identified from conventional camera 2D input sources. It is then combined with other machine learning methods for the activity classification process from the obtained 3D framework. Classifiers that can be used include Support Vector Machine (SVM), Neural Network (NN), Long short-term memory (LSTM), and Transformer. Thus, HAR can be applied flexibly in various scopes of supervision without the help of 3D sensors. The experiment results inform that Transformer is the best in accuracy while SVM is in speed.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1